INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a8c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ca238c r4:85ca2000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ca238c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:832eb000 r4:832eb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832eb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499d38c r4:8499d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499d38c r4:83363280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832eb000 r8:833632ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363280 r8:8027ed34 r7:df83de60 r6:832a1400 r5:832eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8335fb00 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:2:96 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:96 tgid:96 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:832fb000 r4:832fb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832fb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bd600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474738c r4:84747000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8474738c r4:832b7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832fb000 r8:832b7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832b7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832b7a80 r8:8027ed34 r7:df879e60 r6:832b7b00 r5:832fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:832bcbc0 INFO: task kworker/1:2:96 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:0:3096 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3096 tgid:3096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df849d84 r8:00000002 r7:60000013 r6:df849d8c r5:839c9800 r4:839c9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839c9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df849e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f11b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed995000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cc2b8c r4:85cc2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85cc2b8c r4:847bb580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c9800 r8:847bb5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847bb580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bb580 r8:8027ed34 r7:eb0c9e60 r6:849cc780 r5:839c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf849fb0 to 0xdf849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:832b2c40 INFO: task kworker/1:0:3096 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:6:3119 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:844c0c00 r4:844c0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844c0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628c80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca35000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d538c r4:858d5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858d538c r4:83349880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c0c00 r8:833498ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349880 r8:8027ed34 r7:df9ede60 r6:849cce00 r5:844c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477f400 INFO: task kworker/1:6:3119 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:7:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:832e8c00 r4:832e8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832e8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0513000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5cb8c r4:84b5c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b5cb8c r4:83349800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8c00 r8:8334982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349800 r8:8027ed34 r7:df971e60 r6:849cca80 r5:832e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477f400 INFO: task kworker/1:7:3120 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:3:3121 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:83aa6c00 r4:83aa6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2b8c r4:850c2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c2b8c r4:849cce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6c00 r8:849cceac r7:82804d40 r6:dddced40 r5:dddced60 r4:849cce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cce80 r8:8027ed34 r7:df911e60 r6:847bbf80 r5:83aa6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d680 INFO: task kworker/0:3:3121 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:4:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83aa6000 r4:83aa6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae7140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0097000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5e38c r4:84b5e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5e38c r4:8431c280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:8431c2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8431c280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8431c280 r8:8027ed34 r7:dfa01e60 r6:83c0e680 r5:83aa6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d680 INFO: task kworker/0:4:3122 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:5:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:84193000 r4:84193000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84193000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba06c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84193000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5e78c r4:84b5e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5e78c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84193000 r8:830cd12c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:dfa01e60 r6:830cd080 r5:84193000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478de40 INFO: task kworker/0:5:3125 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:8:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:84191800 r4:84191800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84191800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e51c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84191800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2cf8c r4:84b2cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2cf8c r4:83349f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84191800 r8:83349fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349f80 r8:8027ed34 r7:df971e60 r6:840e4380 r5:84191800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477f600 INFO: task kworker/1:8:3126 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83308000 r4:83308000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83308000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0509000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c078c r4:850c0400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c078c r4:840e4300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:840e432c r7:82804d40 r6:dddced40 r5:dddced60 r4:840e4300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840e4300 r8:8027ed34 r7:dfa01e60 r6:830b8780 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dd80 INFO: task kworker/0:6:3128 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:8325a400 r4:8325a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8325a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07db000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c238c r4:850c2000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c238c r4:84587980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:845879ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84587980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84587980 r8:8027ed34 r7:dfa01e60 r6:830b8700 r5:8325a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d240 INFO: task kworker/0:7:3131 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83ffc800 r4:83ffc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fae80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ffc800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c338c r4:850c3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c338c r4:84780000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffc800 r8:8478002c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780000 r8:8027ed34 r7:dfa01e60 r6:830b8680 r5:83ffc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c0640 INFO: task kworker/0:8:3134 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83ffd400 r4:83ffd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ffd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473a78c r4:8473a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473a78c r4:84780080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffd400 r8:847800ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780080 r8:8027ed34 r7:dfa59e60 r6:830b8600 r5:83ffd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d300 INFO: task kworker/0:9:3135 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3138 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:8324a400 r4:8324a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eee40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f5f8c r4:852f5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f5f8c r4:84780100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:8478012c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780100 r8:8027ed34 r7:dfa5de60 r6:84585d80 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf100 INFO: task kworker/0:10:3138 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000013 r6:dfa71d8c r5:8389ec00 r4:8389ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8389ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a3c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8389ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da78c r4:852da400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852da78c r4:84780180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8389ec00 r8:847801ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780180 r8:8027ed34 r7:dfa65e60 r6:84585e00 r5:8389ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf040 INFO: task kworker/0:11:3139 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa75d84 r8:00000002 r7:60000013 r6:dfa75d8c r5:84003c00 r4:84003c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84003c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84003c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:832f8c00 r4:832f8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a8e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f638c r4:852f6000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f638c r4:84780200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f8c00 r8:8478022c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780200 r8:8027ed34 r7:dfa65e60 r6:832b7c00 r5:832f8c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xe0421fb0 to 0xe0421ff8) r4:83a9b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a9b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84232f8c r4:84232c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84232f8c r4:84787000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9b000 r8:8478702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787000 r8:8027ed34 r7:df971e60 r6:84787080 r5:83a9b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477fc00 INFO: task kworker/1:10:3146 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0421d20 to 0xe0421d68) r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:83b65400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b65400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473bf8c r4:8473bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473bf8c r4:84780300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b65400 r8:8478032c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780300 r8:8027ed34 r7:dfa95e60 r6:84787180 r5:83b65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf680 INFO: task kworker/0:14:3149 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83b63c00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855417c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b63c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474438c r4:84744000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474438c r4:84780380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b63c00 r8:847803ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84780380 r8:8027ed34 r7:dfa99e60 r6:84787200 r5:83b63c00 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:16:3153 blocked for more than 451 seconds. r5:83b66000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b66000 r8:8478042c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780400 r8:8027ed34 r7:dfaa1e60 r6:84787280 r5:83b66000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf800 INFO: task kworker/0:16:3153 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:17:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:83b66c00 r4:83b66c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b66c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554d7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85420b8c r4:85420800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85420b8c r4:84780480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfab9fb0 to 0xdfab9ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:844d8c00 r4:844d8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b478c r4:855b4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b478c r4:84780500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d8c00 r8:8478052c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780500 r4:00000001 r4:847cfd00 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cfcc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0483000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85422f8c r4:85422c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85422f8c r4:84780580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d9800 r8:847805ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780580 r8:8027ed34 r7:dfac9e60 r6:84787400 r5:844d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cfc40 INFO: task kworker/0:19:3158 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:20 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cfc80 INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847cfe40 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85646f80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb413000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b4f8c r4:855b4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b4f8c r4:84780700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dc800 r8:8478072c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780700 r8:8027ed34 r7:dfaf1e60 r6:84787580 r5:844dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:847cff40 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:844d8000 r4:844d8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b5f8c r4:855b5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:844dbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844dbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7b80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b638c r4:855b6000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b638c r4:84780800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dbc00 r8:8478082c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780800 r8:8027ed34 r7:dfaf1e60 r6:84787680 r5:844dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be5c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df9c0 r7:dddced40 r6:83018000 r5:857a478c r4:84780980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:844dd400 r4:844dd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844dd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582178c r4:85821400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8582178c r4:84780a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dd400 r8:84780aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780a80 r8:8027ed34 r7:dfaf1e60 r6:84787700 r5:844dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84796800 INFO: task kworker/0:27:3174 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8582338c r4:84780b00 Exception stack(0xdfb45fb0 to 0xdfb45ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:844dec00 r4:844dec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844dec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85142bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca43000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599538c r4:85995000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599538c r4:84787800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dec00 r8:8478782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787800 r8:8027ed34 r7:df971e60 r6:84787880 r5:844dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847957c0 INFO: task kworker/1:11:3181 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847957c0 INFO: task kworker/1:12:3182 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:844c9800 r4:844c9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844c9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84787a00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:ed5c3000 r10:61c88647 r9:84196c00 r8:84780bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84796c80 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:84194800 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85ca2f8c r4:85ca2c00 r10:00000000 r9:84780c80 r8:8027ed34 r7:dfb51e60 r6:84780d00 r5:84194800 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:15:3192 blocked for more than 451 seconds. r5:84193c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84193c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85acbf8c r4:85acbc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85acbf8c r4:84787c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84193c00 r8:84787c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787c00 r8:8027ed34 r7:dfb85e60 r6:84780e00 r5:84193c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8442e3c0 INFO: task kworker/1:15:3192 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83309800 r4:83309800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83309800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85c30b8c r4:84787c80 Exception stack(0xdfb99fb0 to 0xdfb99ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83aa9800 r4:83aa9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd9c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599678c r4:85996400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599678c r4:84787d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa9800 r8:84787d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787d00 r8:8027ed34 r7:dfb99e60 r6:84780f00 r5:83aa9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85996f8c r4:84787d80 Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:83aae000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfb5d000 r10:61c88647 r9:83aae000 r8:84787e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8442e800 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd1d84 r8:00000002 r7:60000013 r6:dfbd1d8c r5:83aaa400 r4:83aaa400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aaa400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r10:00000000 r9:84787e80 r8:8027ed34 r7:dfb99e60 r6:8478c080 r5:83aaa400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000013 r6:dfbddd8c r5:83aabc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r5:00001000 r4:ed05f000 r10:61c88647 r9:83aabc00 r8:84787fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8442ea80 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0421dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3205 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:83aad400 r4:83aad400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aad400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85689980 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aad400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed321000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfc78c r4:85bfc400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfc78c r4:84787f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aad400 r8:84787f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:838c4800 r4:838c4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:838c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfcf8c r4:85bfcc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfcf8c r4:84787b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c4800 r8:84787b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787b00 r8:8027ed34 r7:dfbe5e60 r6:8478c200 r5:838c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85bfcb8c r4:84783000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85bfdf8c r4:85bfdc00 r4:84783080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783080 r8:8027ed34 r7:dfc05e60 r6:8478c300 r5:838c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84796980 INFO: task kworker/1:25:3211 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:84196000 r4:84196000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84196000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84196000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfd38c r4:85bfd000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfd38c r4:84783100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84196000 r8:8478312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783100 r8:8027ed34 r7:dfc11e60 r6:8478c380 r5:84196000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8080 INFO: task kworker/1:26:3213 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:27 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85c50f8c r4:84783180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3217 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84a68000 r5:84a68000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a69800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84a6a400 r4:84a6a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c5238c r4:85c52000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c5238c r4:84783300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6a400 r8:8478332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783300 r8:8027ed34 r7:dfc11e60 r6:8478c580 r5:84a6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8540 INFO: task kworker/1:30:3221 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:dfb61d84 r8:00000002 r7:60000013 r6:dfb61d8c r5:844c8000 r4:844c8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844c8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8442ed00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfe38c r4:85bfe000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfe38c r4:84783400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c8000 r8:8478342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783400 r8:8027ed34 r7:dfc11e60 r6:84783480 r5:844c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8580 INFO: task kworker/1:31:3223 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:844ca400 r4:844ca400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ca400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f107000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed869000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bffb8c r4:85bff800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bffb8c r4:84783500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ca400 r8:8478352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783500 r8:8027ed34 r7:dfb61e60 r6:84783580 r5:844ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8a40 INFO: task kworker/1:32:3226 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:844cb000 r4:844cb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844cb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ca1f8c r4:85ca1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ca1f8c r4:84783600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cb000 r8:8478362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783600 r8:8027ed34 r7:dfc61e60 r6:84783680 r5:844cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8a40 INFO: task kworker/1:33:3227 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:34 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:844cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r10:61c88647 r9:844cbc00 r8:8478372c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3232 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc89d84 r8:00000002 r7:60000013 r6:dfc89d8c r5:844cc800 r4:844cc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844cc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f109000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed875000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfff8c r4:85bffc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfff8c r4:84783800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cc800 r8:8478382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783800 r8:8027ed34 r7:dfc75e60 r6:84783880 r5:844cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/1:36:3234 blocked for more than 451 seconds. r5:844cd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85bff78c r4:84783900 r10:61c88647 r9:844cd400 r8:8478392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783900 r8:8027ed34 r7:dfc89e60 r6:84783980 r5:844cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc91fb0 to 0xdfc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8f40 INFO: task kworker/1:36:3234 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:00001000 r4:ed953000 r10:61c88647 r9:844ce000 r8:84783a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 task:kworker/1:38 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85bff38c r4:85bff000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2100 INFO: task kworker/1:38:3237 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:39:3239 blocked for more than 451 seconds. r4:843b8c00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8423a78c r4:84783c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r5:843b9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84239f8c r4:84783d00 r10:61c88647 r9:843b9800 r8:84783d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783d00 r8:8027ed34 r7:dfc9de60 r6:84783d80 r5:843b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2800 INFO: task kworker/1:40:3247 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r9:83018205 r8:843ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f111000 r10:61c88647 r9:843ba400 r8:84783e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 1d60: 80000013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f115000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed97b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85be7f8c r4:85be7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85be7f8c r4:84783f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843bb000 r8:84783f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783f00 r8:8027ed34 r7:df9c5e60 r6:84783f80 r5:843bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2800 INFO: task kworker/1:42:3249 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r9:83018205 r8:843bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f113000 r10:61c88647 r9:843bbc00 r8:8488b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847f2800 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3252 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:843bc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85c1078c r4:85c10400 r10:00000000 r9:8488b100 r8:8027ed34 r7:dfa45e60 r6:8488b180 r5:843bc800 Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2800 INFO: task kworker/1:44:3252 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3255 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:843be000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ca2b8c r4:8478c680 r4:00000001 r4:848c80c0 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 task:kworker/0:32 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ad00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ca338c r4:85ca3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ca338c r4:8478c700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843bec00 r8:8478c72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478c700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478c700 r8:8027ed34 r7:dfb6de60 r6:8488b380 r5:843bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c80c0 INFO: task kworker/0:32:3256 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:843b8000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84199800 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84199800 r8:8478c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478c800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478c800 r8:8027ed34 r7:dfb05e60 r6:8488b480 r5:84199800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c85c0 INFO: task kworker/0:34:3262 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:8419a400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ca3f8c r4:8478c880 Exception stack(0xdfcbdfb0 to 0xdfcbdff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:848c8880 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3266 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:8419b000 r4:8419b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84addf40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cac38c r4:85cac000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cac38c r4:8478c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419b000 r8:8478c9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478c980 r8:8027ed34 r7:dfcc5e60 r6:8488b600 r5:8419b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8880 INFO: task kworker/0:37:3266 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3268 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:8419c800 r4:8419c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cacf8c r4:85cacc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cacf8c r4:8478ca00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419c800 r8:8478ca2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ca00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ca00 r8:8027ed34 r7:dfcc5e60 r6:8488b680 r5:8419c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c89c0 INFO: task kworker/0:38:3268 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8419bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cacb8c r4:85cac800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cacb8c r4:8478ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419bc00 r8:8478caac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ca80 r8:8027ed34 r7:dfcd1e60 r6:8488b700 r5:8419bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8b40 INFO: task kworker/0:39:3270 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ae2180 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:40:3272 blocked for more than 451 seconds. task:kworker/0:40 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84198000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84198000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84198000 r8:8478cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cb00 r8:8027ed34 r7:dfcd1e60 r6:8488b780 r5:84198000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8f00 INFO: task kworker/0:40:3272 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3274 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:8419d400 r4:8419d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf65000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cad38c r4:85cad000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cad38c r4:8478cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419d400 r8:8478cbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cb80 r8:8027ed34 r7:dfce1e60 r6:8488b800 r5:8419d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8d40 INFO: task kworker/0:41:3274 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8419e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3278 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf9d84 r8:00000002 r7:60000013 r6:dfcf9d8c r5:8419ec00 r4:8419ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cbc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed45d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cafb8c r4:85caf800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cafb8c r4:8478cc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:44:3282 blocked for more than 451 seconds. r5:843b0000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed31f000 r10:61c88647 r9:843b0000 r8:8478cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849b4a40 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3284 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd0dd84 r8:00000002 r7:60000013 r6:dfd0dd8c r5:843b1800 r4:843b1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cf00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb078c r4:85cb0400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb078c r4:8478cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b1800 r8:8478cdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cd80 r8:8027ed34 r7:dfcf9e60 r6:8488bb00 r5:843b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526240 INFO: task kworker/0:45:3284 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3286 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd15d84 r8:00000002 r7:60000013 r6:dfd15d8c r5:843b2400 r4:843b2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ce00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4a3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:843b2400 r8:8478ce2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3288 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd1dd84 r8:00000002 r7:60000013 r6:dfd1dd8c r5:843b4800 r4:843b4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed47b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85caff8c r4:85cafc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85caff8c r4:8478ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b4800 r8:8478ceac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:48:3290 blocked for more than 451 seconds. r5:843b3c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed70d000 r10:61c88647 r9:843b3c00 r8:8478cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cf00 r8:8027ed34 r7:dfcf9e60 r6:8488bc80 r5:843b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845261c0 INFO: task kworker/0:48:3290 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:843b3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cac0 r10:61c88647 r9:843b3000 r8:8478cfac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:49:3292 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:50:3294 blocked for more than 451 seconds. r5:843b5400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3296 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3296 tgid:3296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb7dd84 r8:00000002 r7:60000013 r6:dfb7dd8c r5:843b6000 r4:843b6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c8c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85caef8c r4:85caec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85caef8c r4:849ef080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b6000 r8:849ef0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef080 r8:8027ed34 r7:dfd29e60 r6:8488be00 r5:843b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526740 INFO: task kworker/0:51:3296 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:843b6c00 r4:829187f0 r4:00000000 r9:83018005 r8:843b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r4:849ef100 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84009800 r5:84009800 r4:829187f0 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84009800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3cd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85caeb8c r4:85cae800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85caeb8c r4:849ef180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84009800 r8:849ef1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef180 r8:8027ed34 r7:dfd29e60 r6:8488bf00 r5:84009800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526a00 INFO: task kworker/0:53:3301 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3303 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf5d84 r8:00000002 r7:60000013 r6:dfbf5d8c r5:8400a400 r4:8400a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85cae78c r4:849ef200 5fa0: 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:84008000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae3c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84008000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ad000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb178c r4:85cb1400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb178c r4:849ef280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84008000 r8:849ef2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef280 r8:8027ed34 r7:dfd29e60 r6:84271000 r5:84008000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526c40 INFO: task kworker/0:55:3305 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8400bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r5:00001000 r4:ed56f000 r10:61c88647 r9:8400bc00 r8:849ef32c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:57:3309 blocked for more than 451 seconds. r5:8400c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r5:00001000 r4:ed6e7000 r10:61c88647 r9:8400c800 r8:849ef3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8464f780 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3312 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd61d84 r8:00000002 r7:60000113 r6:dfd61d8c r5:8400b000 r4:8400b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae5c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb1f8c r4:85cb1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb1f8c r4:849ef400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400b000 r8:849ef42c r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed703000 r7:dddced40 r6:83018000 r5:85cb238c r4:849ef480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3317 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd75d84 r8:00000002 r7:60000113 r6:dfd75d8c r5:8400e000 r4:8400e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed71b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb2b8c r4:85cb2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb2b8c r4:849ef580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400e000 r8:849ef5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef580 r8:8027ed34 r7:dfd71e60 r6:84271300 r5:8400e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844292c0 INFO: task kworker/0:61:3317 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3655 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:8482bc00 r4:8482bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86cc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499db8c r4:8499d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499db8c r4:84ae2080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482bc00 r8:84ae20ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2080 r8:8027ed34 r7:e00bde60 r6:84ae2100 r5:8482bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe041dfb0 to 0xe041dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:175:3655 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:101:3662 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:101 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0419d84 r8:00000002 r7:60000113 r6:e0419d8c r5:8482ec00 r4:8482ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0419e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a578c r4:849a5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a578c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 INFO: task kworker/1:101:3662 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:3667 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:8482a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 r5:00001000 r4:eda69000 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:103:3669 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:103 state:D stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0439d84 r8:00000002 r7:60000113 r6:e0439d8c r5:84ad6c00 r4:84ad6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ad6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0439e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a5f8c r4:849a5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a5f8c r4:84ae4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad6c00 r8:84ae402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a28000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:849a5b8c r4:849a5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:105:3673 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:105 state:D stack:0 pid:3673 tgid:3673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0449d84 r8:00000002 r7:60000013 r6:e0449d8c r5:84a2a400 r4:84a2a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0449e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a638c r4:849a6000 r7:ddde2d40 r6:83018200 r5:849a638c r4:84ae4100 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0451d84 r8:00000002 r7:60000113 r6:e0451d8c r5:84a29800 r4:84a29800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a29800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0451e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df8ff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a6b8c r4:849a6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a6b8c r4:84ae4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:84ae422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4200 r8:8027ed34 r7:e0449e60 r6:84ae2700 r5:84a29800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:107:3676 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:84a2b000 r4:84a2b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0023000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:849a678c r4:84ae4280 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:108:3684 blocked for more than 452 seconds. r5:84a28c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae4180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:109:3686 blocked for more than 452 seconds. r5:84a2d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:110:3687 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0481d84 r8:00000002 r7:60000113 r6:e0481d8c r5:84a2bc00 r4:84a2bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ae1dc0 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 task:kworker/1:111 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a2ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0489e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1a00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a7f8c r4:849a7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a7f8c r4:84ae4400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2ec00 r8:84ae442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:111:3688 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e048dd84 r8:00000002 r7:60000113 r6:e048dd8c r5:84a2c800 r4:84a2c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a7b8c r4:849a7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a7b8c r4:84ae4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:84ae44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4480 r8:8027ed34 r7:e0489e60 r6:84ae2a00 r5:84a2c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe048dfb0 to 0xe048dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae1dc0 INFO: task kworker/1:112:3690 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:113:3691 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3691 tgid:3691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0491d84 r8:00000002 r7:60000113 r6:e0491d8c r5:84ac8000 r4:84ac8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ac8000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84b1438c r4:84ae4500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac8c00 r5:84ac8c00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:84aca400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08 r5:00001000 r4:dfc97000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae1dc0 INFO: task kworker/1:115:3694 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3695 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04a1d84 r8:00000002 r7:60000113 r6:e04a1d8c r5:84acb000 r4:84acb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84acb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a1e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:84b14f8c r4:84ae4680 Exception stack(0xe04a1fb0 to 0xe04a1ff8) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84acc800 r4:829187f0 r4:00000000 r4:00000000 r5:84b1638c r4:84b16000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3698 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84acd400 r4:84acd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84acd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd79000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84acd400 r8:84ae47ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae0380 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ace000 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae4800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84acbc00 r5:84acbc00 r4:829187f0 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0f80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499cf8c r4:8499cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8499cf8c r4:84ae4880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84acbc00 r8:84ae48ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4880 r8:8027ed34 r7:e04a9e60 r6:84ae2e00 r5:84acbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0f80 INFO: task kworker/1:120:3701 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84acec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:3707 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84ac9800 r5:84ac9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0b00 r10:61c88647 r9:84ac9800 r8:84ae2f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b86a80 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:179 state:D stack:0 pid:3709 tgid:3709 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e002f000 r4:84b8b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84850000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0083000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499e78c r4:8499e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499e78c r4:84b8b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850000 r8:84b8b12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b100 r8:8027ed34 r7:e0441e60 r6:84b8b180 r5:84850000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c1fb0 to 0xe04c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84080 INFO: task kworker/0:180:3712 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:181:3714 blocked for more than 452 seconds. r5:84850c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:182:3716 blocked for more than 452 seconds. r5:84852400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499eb8c r4:8499e800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499eb8c r4:84b8b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84852400 r8:84b8b32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b300 r8:8027ed34 r7:e04c9e60 r6:84b8b380 r5:84852400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c5fb0 to 0xe04c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84200 INFO: task kworker/0:182:3716 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84853000 r5:84853000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e0101000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499fb8c r4:8499f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499fb8c r4:84b8b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853000 r8:84b8b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b400 r8:8027ed34 r7:e04c9e60 r6:84b8b480 r5:84853000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04cdfb0 to 0xe04cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b843c0 INFO: task kworker/0:183:3718 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:84853c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:84854800 r4:829187f0 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b846c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84854800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499f78c r4:8499f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499f78c r4:84b8b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84854800 r8:84b8b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b600 r8:8027ed34 r7:e04cde60 r6:84b8b680 r5:84854800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d5fb0 to 0xe04d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84600 INFO: task kworker/0:185:3722 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84855400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84856000 r4:829187f0 r4:00000000 r7:dddced40 r6:83018000 r5:84738b8c r4:84b8b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:84b8b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b800 r8:8027ed34 r7:e04d9e60 r6:84b8b880 r5:84856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e1fb0 to 0xe04e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84940 INFO: task kworker/0:187:3726 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84ac6000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xe0501fb0 to 0xe0501ff8) 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ac6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08 r10:00000000 r9:84b8b980 r8:8027ed34 r7:e0501e60 r6:84ae4a00 r5:84ac6c00 r5:80000013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3732 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0511d84 r8:00000002 r7:60000113 r6:e0511d8c r5:84ac5400 r4:84ac5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:84b8ba00 INFO: task kworker/0:190:3732 is blocked on a mutex likely owned by task kworker/0:176:3656. r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae0100 r5:84ac4800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:84851800 r8:84b8baac r7:82804d40 r6:dddced40 r5:dddced60 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:84ae2180 r4:84ae0100 r5:84bd8c00 r4:829187f0 r4:00000000 r10:00000000 r9:84ae4c00 r8:8027ed34 r7:e04a9e60 r6:84b8bb80 r5:84bd8c00 r4:e0421dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e053dd84 r8:00000002 r7:60000013 r6:e053dd8c r5:84bd9800 r4:84bd9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bd9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b87600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b16b8c r4:84ae4c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bd9800 r8:84ae4cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4c80 r8:8027ed34 r7:e0539e60 r6:84b8bc00 r5:84bd9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:3743 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 r4:84bda400 r5:84bda400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba0a00 r10:61c88647 r9:84bda400 r8:84b8bcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8280 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r4:84bdb000 r5:84bdb000 r4:829187f0 r4:00000000 r9:83018205 r8:84bdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3746 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:3746 tgid:3746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0545d84 r8:00000002 r7:60000013 r6:e0545d8c r5:84bdbc00 r4:84bdbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bdbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8477f340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bdbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16f8c r4:84b16c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b16f8c r4:84ae4d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bdbc00 r8:84ae4dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0545fb0 to 0xe0545ff8) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:00000000 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0549d84 r8:00000002 r7:60000013 r6:e0549d8c r5:84bdc800 r4:84bdc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bdc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b87240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1738c r4:84b17000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1738c r4:84ae4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bdc800 r8:84ae4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4e00 r8:8027ed34 r7:e0541e60 r6:84b8be80 r5:84bdc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b87fc0 INFO: task kworker/1:127:3748 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:84bdd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae50c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bdd400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe59000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84b1778c r4:84ae4e80 5fa0: 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:00000001 INFO: task kworker/0:193:3752 blocked for more than 452 seconds. r5:84bde000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b8bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8bf00 r8:8027ed34 r7:e04ede60 r6:84817000 r5:84bde000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe054dfb0 to 0xe054dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ad8640 INFO: task kworker/0:193:3752 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 967c0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3755 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:84bdec00 r4:84bdec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bdec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad89c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bdec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r5:84b5db8c r4:84b5d800 Exception stack(0xe04f5fb0 to 0xe04f5ff8) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:84bd8000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84bd8000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff89000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5df8c r4:84b5dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5df8c r4:84817180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bd8000 r8:848171ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84817180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817180 r8:8027ed34 r7:e04ede60 r6:84817200 r5:84bd8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:84856c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b1878c r4:84b18400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1878c r4:84ae4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856c00 r8:84ae4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4f00 r8:8027ed34 r7:e0541e60 r6:84817280 r5:84856c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0559fb0 to 0xe0559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae5380 INFO: task kworker/1:129:3759 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 96ec0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d4778c r4:85d47400 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 r4:84ae0100 Not tainted 6.15.0-syzkaller #0 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a20000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dffb9000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ae4f80 r8:8027ed34 r7:e0559e60 r6:84817300 r5:84a20000 INFO: task kworker/1:130:3762 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 96ec0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a20c00 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84817380 r8:8027ed34 r7:e04ede60 r6:84817400 r5:84a20c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ad8dc0 INFO: task kworker/0:196:3763 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 96ec0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3765 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0565d84 r8:00000002 r7:60000113 r6:e0565d8c r5:84a21800 r4:84a21800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a21800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0565e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:84af7000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0581d84 r8:00000002 r7:60000013 r6:e0581d8c r5:84a24800 r4:84a24800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a24800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae5a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a24800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b18b8c r4:84b18800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b18b8c r4:84af7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:84af712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7100 r8:8027ed34 r7:e0559e60 r6:84817580 r5:84a24800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) Workqueue: events bpf_prog_free_deferred r4:e0421dc0 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a23c00 r5:84a23c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae5d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1938c r4:84b19000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1938c r4:84af7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23c00 r8:84af71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7180 r8:8027ed34 r7:e0581e60 r6:84817600 r5:84a23c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0591fb0 to 0xe0591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80000013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:135:3772 blocked for more than 452 seconds. r5:84ac3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ac3c00 r8:84af722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:136:3775 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:136 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0599d84 r8:00000002 r7:60000013 r6:e0599d8c r5:84ac3000 r4:84ac3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae5e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ac3000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df983000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1978c r4:84b19400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1978c r4:84af7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3000 r8:84af732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7300 r8:8027ed34 r7:e0591e60 r6:84af7380 r5:84ac3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0599fb0 to 0xe0599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae5fc0 INFO: task kworker/1:136:3775 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 983a4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:137:3777 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84bc0000 r5:84bc0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478db80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bc0000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb55000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b19b8c r4:84b19800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b19b8c r4:84af7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bc0000 r8:84af742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7400 r8:8027ed34 r7:e0599e60 r6:84af7480 r5:84bc0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a5fb0 to 0xe05a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dc00 INFO: task kworker/1:137:3777 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 983a4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84bc0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08 r5:00001000 r4:dfbe1000 r10:61c88647 r9:84bc0c00 r8:84af752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478dc00 Call trace: 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:3781 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0465d84 r8:00000002 r7:60000013 r6:e0465d8c r5:84a26000 r4:84a26000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0465e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8477f740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:84b19f8c r4:84b19c00 r4:84af7580 r10:00000000 r9:84af7580 r8:8027ed34 r7:e0459e60 r6:84817700 r5:84a26000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae5500 INFO: task kworker/1:139:3781 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a26c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfc2b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1a78c r4:84af7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a26c00 r8:84af762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7600 r8:8027ed34 r7:e0459e60 r6:84817780 r5:84a26c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe046dfb0 to 0xe046dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1b0c0 INFO: task kworker/1:140:3783 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 989da000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:84be0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0471fb0 to 0xe0471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1b300 INFO: task kworker/1:141:3784 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 989da000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84be1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1b280 r7:ddde2d40 r6:83018200 r5:84b1ab8c r4:84af7700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be1800 r8:84af772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7700 r8:8027ed34 r7:e0471e60 r6:84817880 r5:84be1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a9fb0 to 0xe05a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1b440 INFO: task kworker/1:142:3786 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000013 r4:80239bd0 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:143 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05c1d84 r8:00000002 r7:60000013 r6:e05c1d8c r5:84be0c00 r4:84be0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1b680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84be0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1b78c r4:84b1b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84be0c00 r8:84af77ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:144:3790 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05c9d84 r8:00000002 r7:60000013 r6:e05c9d8c r5:84be3c00 r4:84be3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1b5c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84be3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd99000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1b38c r4:84b1b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1b38c r4:84af7800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be3c00 r8:84af782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7800 r8:8027ed34 r7:e05c1e60 r6:84817980 r5:84be3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c9fb0 to 0xe05c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1b400 INFO: task kworker/1:144:3790 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:84be3000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:84b1bb8c r4:84b1b800 r10:00000000 r9:84af7880 r8:8027ed34 r7:e05c1e60 r6:84817a00 r5:84be3000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:146:3795 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:146 state:D stack:0 pid:3795 tgid:3795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05e1d84 r8:00000002 r7:60000113 r6:e05e1d8c r5:84be5400 r4:84be5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1b940 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84be5400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1bf8c r4:84b1bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1bf8c r4:84af7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be5400 r8:84af792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7900 r8:8027ed34 r7:e05d5e60 r6:84817a80 r5:84be5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05e1fb0 to 0xe05e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1b7c0 INFO: task kworker/1:146:3795 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 99942000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3797 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3797 tgid:3797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05e5d84 r8:00000002 r7:60000013 r6:e05e5d8c r5:84be6000 r4:84be6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05e5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84a1b980 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:148:3798 blocked for more than 452 seconds. r5:84be6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d9e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af7a00 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1b800 INFO: task kworker/1:148:3798 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 99eb5000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05cdd84 r8:00000002 r7:60000013 r6:e05cdd8c r5:84bc2400 r4:84bc2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bc2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05cde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a1bc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bc2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0049000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1c78c r4:84b1c400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1c78c r4:84af7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bc2400 r8:84af7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7a80 r8:8027ed34 r7:e05e5e60 r6:84af7b00 r5:84bc2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05cdfb0 to 0xe05cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1ba80 INFO: task kworker/1:149:3801 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 INFO: task kworker/1:150:3804 blocked for more than 453 seconds. r5:84bc4800 r4:829187f0 r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3807 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3807 tgid:3807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05edd84 r8:00000002 r7:60000113 r6:e05edd8c r5:84bc3000 r4:84bc3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bc3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b87fc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bc3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1d38c r4:84b1d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1d38c r4:84af7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bc3000 r8:84af7cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7c80 r8:8027ed34 r7:e0575e60 r6:84af7d00 r5:84bc3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05edfb0 to 0xe05edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a1bec0 INFO: task kworker/1:151:3807 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9a685000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84bc5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:3810 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e05f9d84 r8:00000002 r7:60000113 r6:e05f9d8c r5:84bc6000 r4:84bc6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bc6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bc6000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1e78c r4:84b1e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1e78c r4:84af7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bc6000 r8:84af7eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7e80 r8:8027ed34 r7:e05f1e60 r6:84af7f00 r5:84bc6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05f9fb0 to 0xe05f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b95280 INFO: task kworker/1:153:3810 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b950c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bc6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0475000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1db8c r4:84b1d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1db8c r4:84af7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bc6c00 r8:84af7fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7f80 r8:8027ed34 r7:e05f9e60 r6:84b9b000 r5:84bc6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0605fb0 to 0xe0605ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b95100 INFO: task kworker/1:154:3811 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9aecc000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84bc1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95540 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 r5:00001000 r4:eda69000 r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3815 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3815 tgid:3815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:844a0c00 r4:844a0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04a5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b1e38c r4:84b1e000 r4:00000001 INFO: task kworker/1:156:3815 is blocked on a mutex likely owned by task kworker/0:176:3656. 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:844a0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08 r5:00001000 r4:e04f1000 r7:ddde2d40 r6:83018200 r5:84b1eb8c r4:84b9b280 r4:84b9b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b280 r8:8027ed34 r7:e05f9e60 r6:84b9b300 r5:844a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0609fb0 to 0xe0609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b95800 INFO: task kworker/1:157:3818 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9b9e1000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:158:3819 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:158 state:D stack:0 pid:3819 tgid:3819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:e0629d84 r8:00000002 r7:60000113 r6:e0629d8c r5:844a2400 r5:844a2400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b9b380 r8:8027ed34 r7:e0609e60 r6:84b9b400 r5:844a2400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:3822 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:e0621d84 r8:00000002 r7:60000113 r6:e0621d8c r5:844a3000 r5:844a3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b95b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0507000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1ef8c r4:84b1ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1ef8c r4:84b9b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a3000 r8:84b9b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b9b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b480 r8:8027ed34 r7:e0629e60 r6:84b9b500 r5:844a3000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844a3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84b1f38c r4:84b9b580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844a4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba5540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0645000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2c78c r4:84b2c400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2c78c r4:84b9b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a4800 r8:84b9b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b9b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9b680 r8:8027ed34 r7:e0629e60 r6:84b9b700 r5:844a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b95dc0 INFO: task kworker/1:161:3826 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9c796000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ae0100 task:kworker/1:162 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844a6000 r4:829187f0 r4:00000000 r4:00000000 r5:84b1fb8c r4:84b1f800 r4:84b9b780 r10:00000000 r9:84b9b780 r8:8027ed34 r7:e0635e60 r6:84b9b800 r5:844a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba5100 INFO: task kworker/1:162:3828 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9c796000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:844a6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84b1ff8c r4:84b9b880 Exception stack(0xe063dfb0 to 0xe063dff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:164:3831 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:164 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:844a5400 r4:844a5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba5400 r10:61c88647 r9:844a5400 r8:84b9b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/1:165:3834 blocked for more than 453 seconds. r5:844a1800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2d38c r4:84b9ba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844a1800 r8:84b9baac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b9ba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9ba80 r8:8027ed34 r7:e0635e60 r6:84b9bb00 r5:844a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba5580 INFO: task kworker/1:165:3834 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9d8bf000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84bc3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84bc3c00 r8:84b9bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b9bb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9bb80 r8:8027ed34 r7:e0641e60 r6:84b9bc00 r5:84bc3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba5580 INFO: task kworker/1:166:3835 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9d8bf000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:167:3837 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:167 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e065dd84 r8:00000002 r7:60000113 r6:e065dd8c r5:844a8c00 r4:844a8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844a8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ade9c0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84ba5980 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ae0100 task:kworker/1:168 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844a8000 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b9bd80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9dce4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:844aa400 r5:844aa400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2df8c r4:84b2dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2df8c r4:84b9be80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844aa400 r8:84b9beac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b9be80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b9be80 r8:8027ed34 r7:e0651e60 r6:84b9bf00 r5:844aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba5c00 INFO: task kworker/1:169:3844 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80000013 r4:80239bd0 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:197:3846 blocked for more than 453 seconds. r5:844abc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:844abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r10:00000000 r9:84817c00 r8:8027ed34 r7:e04ede60 r6:84b9bf80 r5:844abc00 r4:84ba09c0 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0689d84 r8:00000002 r7:60000113 r6:e0689d8c r5:844ad400 r4:844ad400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ad400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0689e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba8000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0725000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2db8c r4:84b2d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2db8c r4:84bac000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ad400 r8:84bac02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bac000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bac000 r8:8027ed34 r7:e0671e60 r6:84bac080 r5:844ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0689fb0 to 0xe0689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba5e40 INFO: task kworker/1:170:3848 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9e48c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:844ae000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b5f78c r4:84817c80 Exception stack(0xe068dfb0 to 0xe068dff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:844ac800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:844ac800 r8:84817d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84817d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817d00 r8:8027ed34 r7:e068de60 r6:84bac180 r5:844ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0695fb0 to 0xe0695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba0e80 INFO: task kworker/0:199:3851 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9efa9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:844ab000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:84b5fb8c r4:84b5f800 r10:00000000 r9:84817d80 r8:8027ed34 r7:e0695e60 r6:84bac200 r5:844ab000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:201 state:D stack:0 pid:3855 tgid:3855 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba0f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe93000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5ff8c r4:84b5fc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5ff8c r4:84817e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b0c00 r8:84817e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84817e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817e00 r8:8027ed34 r7:e0695e60 r6:84bac280 r5:844b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba0480 INFO: task kworker/0:201:3855 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9f273000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844b2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:8473838c r4:84817e80 Exception stack(0xe06b1fb0 to 0xe06b1ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9f606000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:3859 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06b9d84 r8:00000002 r7:60000113 r6:e06b9d8c r5:844b3c00 r4:844b3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba0280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:844b3c00 r8:84817f2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:204 state:D stack:0 pid:3860 tgid:3860 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844b0000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba5f40 r7:dddced40 r6:83018000 r5:84b7038c r4:84817f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba0380 INFO: task kworker/0:204:3860 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 9fbff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:3863 blocked for more than 453 seconds. task:kworker/0:205 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844b3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 r5:84b7078c r4:84b70400 r4:84ba7000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:3864 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:3864 tgid:3864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06cdd84 r8:00000002 r7:60000013 r6:e06cdd8c r5:844b1800 r4:844b1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/0:206:3864 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:3867 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:844b4800 r4:844b4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844b4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b70f8c r4:84b70c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b70f8c r4:84ba7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b4800 r8:84ba712c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7100 r8:8027ed34 r7:e0695e60 r6:84bac580 r5:844b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b9e280 INFO: task kworker/0:207:3867 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a02f1000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:844b5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:844b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 r10:00000000 r9:84ba7180 r8:8027ed34 r7:e0695e60 r6:84bac600 r5:844b5400 INFO: task kworker/0:208:3868 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a04ef000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844aec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b71f8c r4:84ba7200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844aec00 r8:84ba722c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7200 r8:8027ed34 r7:e0695e60 r6:84bac680 r5:844aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f1fb0 to 0xe06f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b9e3c0 INFO: task kworker/0:209:3871 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a0802000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84be2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b71b8c r4:84b71800 r4:84ba7280 Exception stack(0xe066dfb0 to 0xe066dff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3875 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06e9d84 r8:00000002 r7:60000113 r6:e06e9d8c r5:84be4800 r4:84be4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84be4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84be4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7238c r4:84b72000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7238c r4:84ba7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84be4800 r8:84ba73ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7380 r8:8027ed34 r7:e06f1e60 r6:84ba7400 r5:84be4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b9e5c0 INFO: task kworker/0:211:3875 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:212:3878 blocked for more than 453 seconds. r5:84a23000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b72b8c r4:84b72800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b72b8c r4:84ba7480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23000 r8:84ba74ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7480 r8:8027ed34 r7:e06e9e60 r6:84ba7500 r5:84a23000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06f5fb0 to 0xe06f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b9e780 INFO: task kworker/0:212:3878 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a0e56000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:3879 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84a25400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9e940 r7:dddced40 r6:83018000 r5:84b7278c r4:84ba7580 Exception stack(0xe0675fb0 to 0xe0675ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b9e780 INFO: task kworker/0:213:3879 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a161c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84a38000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9ebc0 r7:dddced40 r6:83018000 r5:84b72f8c r4:84ba7680 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b9eac0 INFO: task kworker/0:214:3882 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a189c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a38c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:844a9800 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/1:171:3886 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a1f26000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:3887 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0715d84 r8:00000002 r7:60000013 r6:e0715d8c r5:844b6c00 r4:844b6c00 r5:844b6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:84b7378c r4:84ba7880 Exception stack(0xe0715fb0 to 0xe0715ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84ae0100 task:kworker/1:172 state:D stack:0 pid:3888 tgid:3888 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:844b6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e5280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2e78c r4:84b2e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2e78c r4:84bac880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b6000 r8:84bac8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bac880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bac880 r8:8027ed34 r7:e0729e60 r6:84bac900 r5:844b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0741fb0 to 0xe0741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ba8280 INFO: task kworker/1:172:3888 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a2370000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3891 blocked for more than 454 seconds. task:kworker/0:217 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84bf8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:84b7838c r4:84ba7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bf8000 r8:84ba792c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7900 r8:8027ed34 r7:e0715e60 r6:84bac980 r5:84bf8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0759fb0 to 0xe0759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b83280 INFO: task kworker/0:217:3891 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a2370000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84bfa400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b83140 r7:dddced40 r6:83018000 r5:84b73b8c r4:84ba7980 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3894 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:84bf8c00 r4:84bf8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bf8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b832c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bf8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b73f8c r4:84b73c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b73f8c r4:84ba7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bf8c00 r8:84ba7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7a00 r8:8027ed34 r7:e0759e60 r6:84baca80 r5:84bf8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:e0421dc0 r5:00001000 r4:eda69000 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r4:84bf9800 r5:84bf9800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0779e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ba7a80 r8:8027ed34 r7:e0759e60 r6:84bacb00 r5:84bf9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0779fb0 to 0xe0779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b834c0 INFO: task kworker/0:220:3896 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a2dcc000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Not tainted 6.15.0-syzkaller #0 r5:84bfb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3900 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0795d84 r8:00000002 r7:60000013 r6:e0795d8c r5:84bfd400 r4:84bfd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bfd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0795e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b83640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bfd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0785000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b78b8c r4:84b78800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b78b8c r4:84ba7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bfd400 r8:84ba7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7b80 r8:8027ed34 r7:e0779e60 r6:84bacc00 r5:84bfd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0795fb0 to 0xe0795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b83480 INFO: task kworker/0:222:3900 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a3228000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:223:3902 blocked for more than 454 seconds. r5:84bfc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a3228000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:3904 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07c5d84 r8:00000002 r7:60000113 r6:e07c5d8c r5:84bfec00 r4:84bfec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bfec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:84b79b8c r4:84ba7c80 r4:84ba7c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c5fb0 to 0xe07c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b837c0 INFO: task kworker/0:224:3904 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a3228000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:3906 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07d5d84 r8:00000002 r7:60000113 r6:e07d5d8c r5:85000000 r5:85000000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: 1d20: a35a8000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:3908 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07e5d84 r8:00000002 r7:60000013 r6:e07e5d8c r5:85001800 r4:85001800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85001800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b9efc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85001800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a2000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7a78c r4:84b7a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7a78c r4:84ba7d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:84ae0100 task:kworker/0:227 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85003000 r4:829187f0 r4:00000000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85003c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e0801000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7a38c r4:84b7a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7a38c r4:84ba7e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85003c00 r8:84ba7eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7e80 r8:8027ed34 r7:e07e5e60 r6:84bacf00 r5:85003c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe081dfb0 to 0xe081dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b83f00 INFO: task kworker/0:228:3912 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a3c00000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/0:229:3916 blocked for more than 454 seconds. r5:85002400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b7bf8c r4:84b7bc00 r7:dddced40 r6:83018000 r5:84b7bf8c r4:84ba7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85002400 r8:84ba7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84ba7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ba7f00 r8:8027ed34 r7:e07e5e60 r6:84bacf80 r5:85002400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b83ec0 INFO: task kworker/0:229:3916 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a3feb000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 r4:00000001 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:85004800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ba7f80 r8:8027ed34 r7:e0739e60 r6:84b0a000 r5:85004800 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3920 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0829d84 r8:00000002 r7:60000013 r6:e0829d8c r5:85005400 r4:85005400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85005400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0829e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85006000 r5:85006000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e082de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b033c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85006000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7b38c r4:84b7b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7b38c r4:84b04080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85006000 r8:84b040ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04080 r8:8027ed34 r7:e0739e60 r6:84b0a100 r5:85006000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe082dfb0 to 0xe082dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b030c0 INFO: task kworker/0:232:3921 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a46a3000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:3924 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0841d84 r8:00000002 r7:60000013 r6:e0841d8c r5:84bfbc00 r4:84bfbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bfbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0841e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b03500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bfbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc9f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7b78c r4:84b7b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7b78c r4:84b04100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bfbc00 r8:84b0412c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04100 r8:8027ed34 r7:e0739e60 r6:84b0a180 r5:84bfbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0841fb0 to 0xe0841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03580 INFO: task kworker/0:233:3924 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:3925 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0819d84 r8:00000002 r7:60000113 r6:e0819d8c r5:84a3b000 r4:84a3b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0819e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b035c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdaf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7bb8c r4:84b7b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7bb8c r4:84b04180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3b000 r8:84b041ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04180 r8:8027ed34 r7:e0739e60 r6:84b04200 r5:84a3b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0819fb0 to 0xe0819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03380 INFO: task kworker/0:234:3925 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a46a3000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:3929 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e083dd84 r8:00000002 r7:60000113 r6:e083dd8c r5:84a3bc00 r4:84a3bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e083de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b03840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0027000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7c38c r4:84b7c000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7c38c r4:84b04280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3bc00 r8:84b042ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04280 r8:8027ed34 r7:e0739e60 r6:84b04300 r5:84a3bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe083dfb0 to 0xe083dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03680 INFO: task kworker/0:235:3929 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a4aa4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:82ac11e4 r4:e0421dc0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:3930 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0849d84 r8:00000002 r7:60000013 r6:e0849d8c r5:84a3c800 r4:84a3c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0849e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b03a00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0047000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7c78c r4:84b7c400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7c78c r4:84b04380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3c800 r8:84b043ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04380 r8:8027ed34 r7:e083de60 r6:84b04400 r5:84a3c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0849fb0 to 0xe0849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03680 INFO: task kworker/0:236:3930 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a4f47000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3932 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a3d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e084de08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0099000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7cb8c r4:84b7c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7cb8c r4:84b04480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3d400 r8:84b044ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04480 r8:8027ed34 r7:e0849e60 r6:84b04500 r5:84a3d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe084dfb0 to 0xe084dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b039c0 INFO: task kworker/0:237:3932 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a4f47000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3934 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84a3e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0745e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b03cc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7cf8c r4:84b7cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7cf8c r4:84b04580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:84b045ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04580 r8:8027ed34 r7:e084de60 r6:84b04600 r5:84a3e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0745fb0 to 0xe0745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03b00 INFO: task kworker/0:238:3934 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a530f000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3937 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0871d84 r8:00000002 r7:60000113 r6:e0871d8c r5:84a3ec00 r4:84a3ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b03e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0443000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7d38c r4:84b7d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7d38c r4:84b04680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:84b046ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04680 r8:8027ed34 r7:e0745e60 r6:84b04700 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0871fb0 to 0xe0871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03c00 INFO: task kworker/0:239:3937 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a530f000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84a39800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84a39800 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7d78c r4:84b7d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7d78c r4:84b04780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a39800 r8:84b047ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04780 r8:8027ed34 r7:e0871e60 r6:84b04800 r5:84a39800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0879fb0 to 0xe0879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03d80 INFO: task kworker/0:240:3938 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a57c2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3941 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e087dd84 r8:00000002 r7:60000013 r6:e087dd8c r5:84a3a400 r4:84a3a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e087de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba5740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0469000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7db8c r4:84b7d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7db8c r4:84b04880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3a400 r8:84b048ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04880 r8:8027ed34 r7:e0879e60 r6:84b04900 r5:84a3a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe087dfb0 to 0xe087dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ade3c0 INFO: task kworker/0:241:3941 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a57c2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3942 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4885d84 r8:00000002 r7:60000013 r6:e4885d8c r5:85070000 r4:85070000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85070000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4885e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85070000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0485000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7df8c r4:84b7dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7df8c r4:84b04980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85070000 r8:84b049ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04980 r8:8027ed34 r7:e087de60 r6:84b04a00 r5:85070000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4885fb0 to 0xe4885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b03040 INFO: task kworker/0:242:3942 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a57c2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:3944 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4889d84 r8:00000002 r7:60000113 r6:e4889d8c r5:85070c00 r4:85070c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85070c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4889e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85070c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04af000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7e38c r4:84b7e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7e38c r4:84b04a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85070c00 r8:84b04aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04a80 r8:8027ed34 r7:e4885e60 r6:84b04b00 r5:85070c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4889fb0 to 0xe4889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84781280 INFO: task kworker/0:243:3944 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a5a5e000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:3947 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e488dd84 r8:00000002 r7:60000013 r6:e488dd8c r5:85071800 r4:85071800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85071800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e488de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85071800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7e78c r4:84b7e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7e78c r4:84b04b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85071800 r8:84b04bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04b80 r8:8027ed34 r7:e4889e60 r6:84b04c00 r5:85071800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe488dfb0 to 0xe488dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84781100 INFO: task kworker/0:244:3947 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a5cfa000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:3948 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4895d84 r8:00000002 r7:60000013 r6:e4895d8c r5:85072400 r4:85072400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85072400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4895e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85072400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0515000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7ef8c r4:84b7ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7ef8c r4:84b04c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85072400 r8:84b04cac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04c80 r8:8027ed34 r7:e488de60 r6:84b04d00 r5:85072400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4895fb0 to 0xe4895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847812c0 INFO: task kworker/0:245:3948 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a5cfa000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:3949 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:3949 tgid:3949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0875d84 r8:00000002 r7:60000113 r6:e0875d8c r5:85073000 r4:85073000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85073000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0875e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85073000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7eb8c r4:84b7e800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7eb8c r4:84b04d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85073000 r8:84b04dac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04d80 r8:8027ed34 r7:e4895e60 r6:84b04e00 r5:85073000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0875fb0 to 0xe0875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847812c0 INFO: task kworker/0:246:3949 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a648e000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:3952 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4899d84 r8:00000002 r7:60000113 r6:e4899d8c r5:85073c00 r4:85073c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85073c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4899e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85073c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7f38c r4:84b7f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7f38c r4:84b04e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85073c00 r8:84b04eac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04e80 r8:8027ed34 r7:e4895e60 r6:84b04f00 r5:85073c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4899fb0 to 0xe4899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84781640 INFO: task kworker/0:247:3952 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a648e000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:3955 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48a1d84 r8:00000002 r7:60000113 r6:e48a1d8c r5:85074800 r4:85074800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85074800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48a1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85074800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7f78c r4:84b7f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7f78c r4:84b04f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85074800 r8:84b04fac r7:82804d40 r6:dddced40 r5:dddced60 r4:84b04f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b04f80 r8:8027ed34 r7:e4899e60 r6:84527000 r5:85074800 r4:84781700 1d60: 80000013 ffffffff r4:00000000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:249:3956 blocked for more than 454 seconds. r4:85075400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85075400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e489de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85075400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84781840 1d20: a6847000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e0615000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84781a80 INFO: task kworker/0:250:3958 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a6c1b000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:3959 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48b1d84 r8:00000002 r7:60000113 r6:e48b1d8c r5:84bfe000 r4:84bfe000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bfe000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48b1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781b80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bfe000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b7ff8c r4:84b7fc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b7ff8c r4:84527200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bfe000 r8:8452722c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527200 r8:8027ed34 r7:e48ade60 r6:84b0a280 r5:84bfe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48b1fb0 to 0xe48b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84781d40 INFO: task kworker/0:251:3959 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a6d5c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:3962 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48bdd84 r8:00000002 r7:60000013 r6:e48bdd8c r5:85008000 r5:85008000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48bde08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85008000 r8:845272ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a7025000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:3963 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:3963 tgid:3963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48a5d84 r8:00000002 r7:60000113 r6:e48a5d8c r5:85076000 r4:85076000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85076000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84781e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85076000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ac78c r4:850ac400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ac78c r4:84527300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85076000 r8:8452732c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527300 r8:8027ed34 r7:e48bde60 r6:84527380 r5:85076000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48a5fb0 to 0xe48a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84781d00 INFO: task kworker/0:253:3963 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 Exception stack(0xe0421d20 to 0xe0421d68) r5:80000013 r4:80239bd0 r4:e0421dc0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:3966 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48c1d84 r8:00000002 r7:60000013 r6:e48c1d8c r5:85076c00 r4:85076c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85076c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85076c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850acb8c r4:850ac800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850acb8c r4:84527400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85076c00 r8:8452742c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527400 r8:8027ed34 r7:e48bde60 r6:84527480 r5:85076c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48c1fb0 to 0xe48c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a10c0 INFO: task kworker/0:254:3966 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a74f6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:3969 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85006c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a11c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85006c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0667000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850acf8c r4:850acc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850acf8c r4:84527500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85006c00 r8:8452752c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527500 r8:8027ed34 r7:e48bde60 r6:84527580 r5:85006c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48cdfb0 to 0xe48cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a1180 INFO: task kworker/0:255:3969 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a74f6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:3970 blocked for more than 454 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48d1d84 r8:00000002 r7:60000113 r6:e48d1d8c r5:84860000 r4:84860000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84860000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a13c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48c5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ad78c r4:850ad400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850ad78c r4:84527600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860000 r8:8452762c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527600 r8:8027ed34 r7:e48bde60 r6:84527680 r5:84860000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48d1fb0 to 0xe48d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a1580 INFO: task kworker/0:256:3970 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a77cd000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:3973 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48d5d84 r8:00000002 r7:60000013 r6:e48d5d8c r5:84860c00 r4:84860c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84860c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48df000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850adb8c r4:850ad800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850adb8c r4:84527700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84860c00 r8:8452772c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527700 r8:8027ed34 r7:e48d1e60 r6:84527780 r5:84860c00 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a7be7000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84861800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84527800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d20: a7f10000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:84862400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 r10:00000000 r9:84527900 r8:8027ed34 r7:e48dde60 r6:84527980 r5:84862400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48e9fb0 to 0xe48e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a17c0 INFO: task kworker/0:259:3976 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a7f10000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:260:3978 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:3978 tgid:3978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48f1d84 r8:00000002 r7:60000113 r6:e48f1d8c r5:84863000 r4:84863000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84863000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48f1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:00000001 r4:84ae0100 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48fdd84 r8:00000002 r7:60000013 r6:e48fdd8c r5:84863c00 r4:84863c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84863c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48fde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1b80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8905000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850aeb8c r4:850ae800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850aeb8c r4:84527b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84863c00 r8:84527b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527b00 r8:8027ed34 r7:e48e9e60 r6:84527b80 r5:84863c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80000013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84864800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8909e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8909fb0 to 0xe8909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a1bc0 INFO: task kworker/0:262:3982 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a868a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:263:3984 blocked for more than 454 seconds. r5:84865400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847a1f40 r4:84527d00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84866000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e6000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84866000 r8:84527e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84527e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84527e00 r8:8027ed34 r7:e8911e60 r6:84527e80 r5:84866000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe891dfb0 to 0xe891dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847a1f00 INFO: task kworker/0:264:3986 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a8983000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/0:265:3988 blocked for more than 454 seconds. r5:84866c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84866c00 r8:84527f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: a8983000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:e48a9d84 r8:00000002 r7:60000013 r6:e48a9d8c r5:85078c00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e5500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85078c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfceb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2ef8c r4:84b2ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2ef8c r4:84b0a380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:84b0a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a380 r8:8027ed34 r7:e0729e60 r6:8479e000 r5:85078c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe48a9fb0 to 0xe48a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e52c0 INFO: task kworker/1:173:3992 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a8cdf000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8507a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8507a400 r8:8479e0ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:85078000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08880 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0755000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850aff8c r4:850afc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850aff8c r4:8479e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:8479e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8479e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479e180 r8:8027ed34 r7:e06c1e60 r6:8479e200 r5:85078000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d1fb0 to 0xe06d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e63c0 INFO: task kworker/0:267:3995 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a919d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:174:3997 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85079800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e5840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85079800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff93000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2fb8c r4:84b2f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2fb8c r4:84b0a400 r10:61c88647 r9:85079800 r8:84b0a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8507bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:84b2f38c r4:84b2f000 r10:00000000 r9:84b0a480 r8:8027ed34 r7:e0701e60 r6:8479e300 r5:8507bc00 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8507b000 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e5680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8507b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2f78c r4:84b2f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2f78c r4:84b0a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:84b0a52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a500 r8:8027ed34 r7:e0701e60 r6:8479e380 r5:8507b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe075dfb0 to 0xe075dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e58c0 INFO: task kworker/1:176:4000 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a9db8000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8507c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8507d400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b0a600 r8:8027ed34 r7:e07a1e60 r6:8479e480 r5:8507d400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0421d20 to 0xe0421d68) 1d20: a9db8000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:4006 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:4006 tgid:4006 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e893dd84 r8:00000002 r7:60000013 r6:e893dd8c r5:8507e000 r4:8507e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8507e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e893de08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8423378c r4:84233400 r4:00000001 r4:847e5bc0 Call trace: 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:180:4008 blocked for more than 455 seconds. r5:85080c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e5b40 r10:61c88647 r9:85080c00 r8:84b0a72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a700 r8:8027ed34 r7:e07a1e60 r6:8479e580 r5:85080c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8945fb0 to 0xe8945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e5e00 INFO: task kworker/1:180:4008 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: aa58c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:4010 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e894dd84 r8:00000002 r7:60000113 r6:e894dd8c r5:85080000 r4:85080000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85080000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e894de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503c78c r4:8503c400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503c78c r4:84b0a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85080000 r8:84b0a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a780 r8:8027ed34 r7:e07a1e60 r6:8479e600 r5:85080000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe894dfb0 to 0xe894dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e5c40 INFO: task kworker/1:181:4010 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:182 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85081800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e5f00 r10:61c88647 r9:85081800 r8:84b0a82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847e50c0 Call trace: 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85083c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8965e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85083c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503cf8c r4:8503cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503cf8c r4:84b0a880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083c00 r8:84b0a8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a880 r8:8027ed34 r7:e07a1e60 r6:8479e700 r5:85083c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8965fb0 to 0xe8965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b39080 INFO: task kworker/1:183:4014 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: aad89000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85083000 r4:829187f0 r4:00000000 r9:83018205 r8:85083000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503d38c r4:84b0a900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083000 r8:84b0a92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a900 r8:8027ed34 r7:e07a1e60 r6:8479e780 r5:85083000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe896dfb0 to 0xe896dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b392c0 INFO: task kworker/1:184:4016 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: aaf9a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:185 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85085400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8975e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85085400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06c3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503d78c r4:8503d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503d78c r4:84b0a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85085400 r8:84b0a9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0a980 r8:8027ed34 r7:e07a1e60 r6:8479e800 r5:85085400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ea985d84 r8:00000002 r7:60000013 r6:ea985d8c r5:85086000 r5:85086000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85086000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503df8c r4:8503dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503df8c r4:84b0aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85086000 r8:84b0aa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0aa00 r8:8027ed34 r7:e07a1e60 r6:8479e880 r5:85086000 r4:00000001 Exception stack(0xea985fb0 to 0xea985ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85082400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b0aa80 r8:8027ed34 r7:ea985e60 r6:8479e900 r5:85082400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ab4a2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:4024 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:85086c00 r4:85086c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85086c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b39640 r4:00000000 r5:00001000 r4:e0703000 r4:84b0ab00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85088000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503e78c r4:8503e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503e78c r4:84b0ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088000 r8:84b0abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0ab80 r8:8027ed34 r7:ea98de60 r6:8479ea00 r5:85088000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b39680 INFO: task kworker/1:189:4026 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: aba84000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:190:4028 blocked for more than 455 seconds. r5:85089800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8503eb8c r4:84b0ac00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:4030 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8508b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8503ef8c r4:84b0ac80 r10:61c88647 r9:8508b000 r8:84b0acac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0ac80 r8:8027ed34 r7:ea98de60 r6:8479eb00 r5:8508b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b39900 INFO: task kworker/1:191:4030 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8508a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8503f78c r4:8503f400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8508c800 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:4036 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8939d84 r8:00000002 r7:60000113 r6:e8939d8c r5:8508d400 r4:8508d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8508d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8939e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08a00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8508d400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c038c r4:850c0000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c038c r4:8479ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508d400 r8:8479ecac r7:82804d40 r6:dddced40 r5:dddced60 r4:8479ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479ec80 r8:8027ed34 r7:e06c1e60 r6:8479ed00 r5:8508d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8939fb0 to 0xe8939ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b08840 INFO: task kworker/0:268:4036 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ac4ee000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/1:194:4039 blocked for more than 455 seconds. r5:8508e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8931e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84b0ae00 r8:8027ed34 r7:ea9c5e60 r6:8479ed80 r5:8508e000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8508ec00 r4:829187f0 r4:00000000 r5:00001000 r4:dfb81000 r7:ddde2d40 r6:83018200 r5:8503ff8c r4:84b0ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508ec00 r8:84b0aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0ae80 r8:8027ed34 r7:ea9c5e60 r6:8479ee00 r5:8508ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b39f40 INFO: task kworker/1:195:4040 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ac8ad000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:4044 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:8508bc00 r4:8508bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8508bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8504078c r4:84b0af00 dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:197:4047 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9d9d84 r8:00000002 r7:60000013 r6:ea9d9d8c r5:84a30c00 r4:84a30c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a30c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8e1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a30c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0029000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85040f8c r4:85040c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85040f8c r4:84b0af80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a30c00 r8:84b0afac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84b0af80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b0af80 r8:8027ed34 r7:ea9cde60 r6:8479ef00 r5:84a30c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b8e0c0 INFO: task kworker/1:197:4047 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ad1a0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ea9c9d84 r8:00000002 r7:60000113 r6:ea9c9d8c r5:8500a400 r5:8500a400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r5:85040b8c r4:85040800 r10:00000000 r9:84813000 r8:8027ed34 r7:ea9d9e60 r6:84813080 r5:8500a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8e0c0 INFO: task kworker/1:198:4048 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ad930000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8500b000 r5:8500b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r5:00001000 r4:e00fb000 r10:61c88647 r9:8500b000 r8:8481312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:199:4050 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:200:4051 blocked for more than 456 seconds. r5:8500bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08 r5:00001000 r4:e008d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504138c r4:85041000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8504138c r4:84813200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500bc00 r8:8481322c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84813200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84813200 r8:8027ed34 r7:ea9d1e60 r6:84813280 r5:8500bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0825fb0 to 0xe0825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8e180 INFO: task kworker/1:200:4051 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ae094000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:ea9e1d84 r8:00000002 r7:60000013 r6:ea9e1d8c r5:8500c800 r5:8500c800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8e500 INFO: task kworker/1:201:4054 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ae47a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:202:4056 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r5:8500d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:4058 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:8500e000 r4:8500e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8500e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8eac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504278c r4:85042400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8504278c r4:84813500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500e000 r8:8481352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84813500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84813500 r8:8027ed34 r7:ea9e1e60 r6:84813580 r5:8500e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e9fb0 to 0xea9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b8e780 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:4060 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9edd84 r8:00000002 r7:60000013 r6:ea9edd8c r5:8500ec00 r4:8500ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8500ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b8e940 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85084800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85042f8c r4:84813700 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:4065 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85010c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xea9f9fb0 to 0xea9f9ff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4066 blocked for more than 456 seconds. r4:84a31800 r5:84a31800 r4:829187f0 r4:00000000 r9:83018005 r8:84a31800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r4:00000001 r4:84b08580 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:4068 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9fdd84 r8:00000002 r7:60000013 r6:ea9fdd8c r5:84a30000 r5:84a30000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb5480 r10:61c88647 r9:84a30000 r8:8481392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb5140 INFO: task kworker/1:207:4068 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: afa9c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85012400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb5600 r7:ddde2d40 r6:83018200 r5:8504338c r4:84813980 5fa0: 00000000 00000000 00000000 00000000 r4:84bb52c0 INFO: task kworker/1:208:4070 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: afdcb000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:4072 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9f1d84 r8:00000002 r7:60000113 r6:ea9f1d8c r5:84a33000 r4:84a33000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a33000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb8040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a33000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:850c0f8c r4:84bbc100 Exception stack(0xea9f1fb0 to 0xea9f1ff8) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:4073 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:4073 tgid:4073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa01d84 r8:00000002 r7:60000113 r6:eaa01d8c r5:84a33c00 r4:84a33c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a33c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84bb8240 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84a34800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84813a80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:210:4077 blocked for more than 456 seconds. r5:85013000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb5940 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85013000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85043b8c r4:85043800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85043b8c r4:84813b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85013000 r8:84813b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84813b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84813b00 r8:8027ed34 r7:eaa0de60 r6:84813b80 r5:85013000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb5400 INFO: task kworker/1:210:4077 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b0b75000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eaa19d84 r8:00000002 r7:60000113 r6:eaa19d8c r5:84a35400 r5:84a35400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8504838c r4:85048000 r10:00000000 r9:84813c00 r8:8027ed34 r7:eaa15e60 r6:84bbc380 r5:84a35400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a36000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a36000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1b8c r4:850c1800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c1b8c r4:84bbc400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36000 r8:84bbc42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbc400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbc400 r8:8027ed34 r7:e06c1e60 r6:84bbc480 r5:84a36000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb8780 INFO: task kworker/0:272:4082 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b109e000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a36c00 r5:84a36c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb88c0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c1f8c r4:84bbc500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a36c00 r8:84bbc52c r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbc500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbc500 r8:8027ed34 r7:e06c1e60 r6:84bbc580 r5:84a36c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb85c0 INFO: task kworker/0:273:4084 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85010000 r5:85010000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84813c80 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85088c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb5f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0845000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504878c r4:85048400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8504878c r4:84813d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088c00 r8:84813dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84813d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84813d80 r8:8027ed34 r7:eaa19e60 r6:84bbc600 r5:85088c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa31fb0 to 0xeaa31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb5e00 INFO: task kworker/1:213:4088 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b1a00000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:85013c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84813e00 r8:8027ed34 r7:eaa31e60 r6:84813e80 r5:85013c00 Workqueue: events bpf_prog_free_deferred [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b1a00000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:4091 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:215 state:D stack:0 pid:4091 tgid:4091 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85014800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85014800 r8:84813f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:216:4095 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:216 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa41d84 r8:00000002 r7:60000113 r6:eaa41d8c r5:85015400 r4:85015400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85015400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb3040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85015400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84bb2000 r8:8027ed34 r7:eaa21e60 r6:84bb2080 r5:85015400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85016000 r5:85016000 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85016000 r8:84bb212c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:217:4097 is blocked on a mutex likely owned by task kworker/0:176:3656. [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b20c9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4098 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa35d84 r8:00000002 r7:60000113 r6:eaa35d8c r5:85016c00 r4:85016c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85016c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:4101 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa4dd84 r8:00000002 r7:60000013 r6:eaa4dd8c r5:85011800 r4:85011800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85011800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bb3700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85011800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e891f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504a38c r4:8504a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8504a38c r4:84bb2300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85011800 r8:84bb232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0421dc0 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:84a32400 r4:829187f0 r4:00000000 r4:00000000 r5:85049f8c r4:85049c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb3380 INFO: task kworker/1:220:4102 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b2646000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:4104 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:4104 tgid:4104 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa59d84 r8:00000002 r7:60000013 r6:eaa59d8c r5:85008c00 r4:85008c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85008c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84bb2500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:222 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb3900 INFO: task kworker/1:222:4107 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b2b42000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:223:4109 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:223 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa65d84 r8:00000002 r7:60000013 r6:eaa65d8c r5:84948c00 r4:84948c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84948c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:224 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeaa69fb0 to 0xeaa69ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb3c40 INFO: task kworker/1:224:4111 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b3150000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:850a0000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:4114 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:4114 tgid:4114 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:850a3000 r4:850a3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa83000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8504bb8c r4:8504b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8504bb8c r4:84bb2900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3000 r8:84bb292c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb2900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeaa81fb0 to 0xeaa81ff8) INFO: task kworker/1:226:4114 is blocked on a mutex likely owned by task kworker/0:176:3656. r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:274 state:D stack:0 pid:4116 tgid:4116 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850a1800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:850a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e896f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c278c r4:850c2400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c278c r4:84bbc780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a1800 r8:84bbc7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbc780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbc780 r8:8027ed34 r7:e06c1e60 r6:84bb2a00 r5:850a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84bb8880 INFO: task kworker/0:274:4116 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:850a2400 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505438c r4:85054000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8505438c r4:84bb2a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a2400 r8:84bb2aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb2a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2a80 r8:8027ed34 r7:eaa81e60 r6:84bb2b00 r5:850a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850e5100 INFO: task kworker/1:227:4118 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eaa8dd84 r8:00000002 r7:60000013 r6:eaa8dd8c r5:850a4800 r5:850a4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:850a4800 r8:84bb2bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850a5400 r5:850a5400 r4:829187f0 r4:00000000 r4:00000000 r5:8505478c r4:85054400 r10:00000000 r9:84bb2c80 r8:8027ed34 r7:eaa91e60 r6:84bb2d00 r5:850a5400 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:230:4124 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:230 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaaa1d84 r8:00000002 r7:60000113 r6:eaaa1d8c r5:850a6000 r4:850a6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5980 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85054f8c r4:85054c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85054f8c r4:84bb2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6000 r8:84bb2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84bb2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bb2d80 r8:8027ed34 r7:eaa75e60 r6:84bb2e00 r5:850a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850e5500 INFO: task kworker/1:230:4124 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) INFO: task kworker/1:231:4126 is blocked on a mutex likely owned by task kworker/0:176:3656. [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:232:4128 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:232 state:D stack:0 pid:4128 tgid:4128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaab5d84 r8:00000002 r7:60000113 r6:eaab5d8c r5:850a3c00 r4:850a3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5b80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeaab5fb0 to 0xeaab5ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85018000 r4:829187f0 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5d00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85018000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505578c r4:85055400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8505578c r4:850e7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85018000 r8:850e70ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e7080 r8:8027ed34 r7:eaab5e60 r6:850e7100 r5:85018000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850e5ac0 INFO: task kworker/1:233:4130 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b4ad6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:85018c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850e5e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85018c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85055b8c r4:85055800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85055b8c r4:850e7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85018c00 r8:850e71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e7180 r8:8027ed34 r7:eaabde60 r6:850e7200 r5:85018c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850e5c40 INFO: task kworker/1:234:4132 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85019800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:850e7280 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:236 state:D stack:0 pid:4136 tgid:4136 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8501a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505638c r4:85056000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8505638c r4:850e7380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501a400 r8:850e73ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e7380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e7380 r8:8027ed34 r7:eaad1e60 r6:850e7400 r5:8501a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f3100 INFO: task kworker/1:236:4136 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b51a5000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8501bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8505678c r4:850e7480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b51a5000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:238:4140 blocked for more than 456 seconds. r5:8501d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3540 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85056f8c r4:85056c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85056f8c r4:850e7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501d400 r8:850e762c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e7600 r8:8027ed34 r7:eaaf1e60 r6:850e7680 r5:8501d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f3300 INFO: task kworker/1:238:4140 is blocked on a mutex likely owned by task kworker/0:176:3656. Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:8501b000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85056b8c r4:85056800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85056b8c r4:850e7580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501b000 r8:850e75ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e7580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e7580 r8:8027ed34 r7:eab01e60 r6:850e7700 r5:8501b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f3400 INFO: task kworker/1:239:4142 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:8501e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8501ec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8501ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab23000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85057b8c r4:85057800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85057b8c r4:850e7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8501ec00 r8:850e78ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850e7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e7880 r8:8027ed34 r7:eab05e60 r6:850e7900 r5:8501ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f3a40 INFO: task kworker/1:241:4146 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8501c800 r4:829187f0 r4:00000000 r4:00000000 r5:8505778c r4:85057400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:242:4147 is blocked on a mutex likely owned by task kworker/0:176:3656. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:4151 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab2dd84 r8:00000002 r7:60000013 r6:eab2dd8c r5:85020c00 r4:85020c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85020c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f3c40 r10:61c88647 r9:85020c00 r8:850e7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f3cc0 INFO: task kworker/1:243:4151 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b67d2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eab21d84 r8:00000002 r7:60000113 r6:eab21d8c r5:85021800 r5:85021800 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85021800 r8:850e7bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4154 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab41d84 r8:00000002 r7:60000013 r6:eab41d8c r5:85023000 r5:85023000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab3de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850e7d80 r8:8027ed34 r7:eab41e60 r6:850e7e00 r5:85020000 Exception stack(0xeab3dfb0 to 0xeab3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850fd140 INFO: task kworker/1:246:4155 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b759d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:4158 blocked for more than 457 seconds. task:kworker/1:247 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85023c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85024800 r8:850e7fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:4162 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:4162 tgid:4162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab55d84 r8:00000002 r7:60000013 r6:eab55d8c r5:85025400 r4:85025400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85025400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:8506578c r4:85065400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85026000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:250:4164 is blocked on a mutex likely owned by task kworker/0:176:3656. [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4166 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab59d84 r8:00000002 r7:60000013 r6:eab59d8c r5:85026c00 r4:85026c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85026c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850fdcc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85026c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506638c r4:85066000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8506638c r4:850fe280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85026c00 r8:850fe2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fe280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fe280 r8:8027ed34 r7:eab49e60 r6:850fe300 r5:85026c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850fd940 INFO: task kworker/1:251:4166 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b8356000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:85028000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85065f8c r4:85065c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85065f8c r4:850fe380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85028000 r8:850fe3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fe380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fe380 r8:8027ed34 r7:eab59e60 r6:850fe400 r5:85028000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab61fb0 to 0xeab61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850fddc0 INFO: task kworker/1:252:4168 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/1:253:4170 blocked for more than 457 seconds. r5:85028c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:850fe480 r8:8027ed34 r7:eab59e60 r6:850fe500 r5:85028c00 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8502a400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8502a400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85066f8c r4:85066c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85066f8c r4:850fe580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502a400 r8:850fe5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fe580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fe580 r8:8027ed34 r7:eab65e60 r6:850fe600 r5:8502a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850fdf40 INFO: task kworker/1:254:4172 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b8ae0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8494bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8494bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85066b8c r4:85066800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85066b8c r4:850fe680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494bc00 r8:850fe6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fe680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fe680 r8:8027ed34 r7:eab69e60 r6:84bbc800 r5:8494bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513a200 INFO: task kworker/1:255:4174 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b8c5d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:256:4176 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:256 state:D stack:0 pid:4176 tgid:4176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8494e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a380 r7:ddde2d40 r6:83018200 r5:8506738c r4:850fe700 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513a280 INFO: task kworker/1:256:4176 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b8f8d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:8494ec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab75e08 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8506778c r4:85067400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8506778c r4:850fe780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494ec00 r8:850fe7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fe780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fe780 r8:8027ed34 r7:eab71e60 r6:84bbc900 r5:8494ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513a240 INFO: task kworker/1:257:4178 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b9436000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 task:kworker/1:258 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8494d400 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:85067b8c r4:850fe800 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:259:4182 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:259 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:8494b000 r4:8494b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8494b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab7de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513a740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8494b000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85067f8c r4:85067c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85067f8c r4:850fe880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8494b000 r8:850fe8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fe880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fe880 r8:8027ed34 r7:eab79e60 r6:84bbca00 r5:8494b000 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:8502bc00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:261 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8502b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513aa00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8502b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0723000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517438c r4:85174000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517438c r4:850fea00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502b000 r8:850fea2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fea00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fea00 r8:8027ed34 r7:eab81e60 r6:850fea80 r5:8502b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513a9c0 INFO: task kworker/1:261:4186 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: b9b31000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eab85d84 r8:00000002 r7:60000013 r6:eab85d8c r5:8502c800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8502c800 r8:850feb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4190 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4190 tgid:4190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:8502d400 r4:8502d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8502d400 r8:850fec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0421d20 to 0xe0421d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:264:4192 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:264 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8502e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8502e000 r8:850fed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fdf40 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:265:4194 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:265 state:D stack:0 pid:4194 tgid:4194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:8502ec00 r4:8502ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8502ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8502ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0783000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517578c r4:85175400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517578c r4:850fee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8502ec00 r8:850fee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:850fee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fee00 r8:8027ed34 r7:eab89e60 r6:850fee80 r5:8502ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:266:4195 blocked for more than 457 seconds. r5:85029800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85029800 r8:850fef2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:4199 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:4199 tgid:4199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaba1d84 r8:00000002 r7:60000013 r6:eaba1d8c r5:85179800 r4:85179800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85179800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851432c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85179800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8941000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175b8c r4:85175800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85175b8c r4:85148000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85179800 r8:8514802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85148000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148000 r8:8027ed34 r7:eab99e60 r6:85148080 r5:85179800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba1fb0 to 0xeaba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85143140 INFO: task kworker/1:267:4199 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bab1a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:268:4201 blocked for more than 457 seconds. task:kworker/1:268 state:D stack:0 pid:4201 tgid:4201 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8517a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8517a400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8959000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517638c r4:85176000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517638c r4:85148100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517a400 r8:8514812c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85148100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148100 r8:8027ed34 r7:eab99e60 r6:85148180 r5:8517a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85143380 INFO: task kworker/1:268:4201 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bab1a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:8517b000 r5:8517b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85148200 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85178000 r4:829187f0 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85178000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2f8c r4:850c2c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c2f8c r4:84bbca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85178000 r8:84bbcaac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbca80 r8:8027ed34 r7:e06c1e60 r6:85148300 r5:85178000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabadfb0 to 0xeabadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850ee7c0 INFO: task kworker/0:275:4205 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bb0a0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/1:270:4207 blocked for more than 457 seconds. r5:85178c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85176b8c r4:85176800 r10:00000000 r9:85148380 r8:8027ed34 r7:eaba9e60 r6:85148400 r5:85178c00 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8517d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8517d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517778c r4:85177400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8517778c r4:85148480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517d400 r8:851484ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85148480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148480 r8:8027ed34 r7:eabb5e60 r6:85148500 r5:8517d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb9fb0 to 0xeabb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85143c00 INFO: task kworker/1:271:4209 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bb6f3000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:8517bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8517bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea999000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85176f8c r4:85176c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85176f8c r4:85148580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517bc00 r8:851485ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85148580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148580 r8:8027ed34 r7:eabb9e60 r6:85148600 r5:8517bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85143e00 INFO: task kworker/1:272:4211 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bbc8a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d60: 80000013 ffffffff r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8517e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8517738c r4:85177000 r10:00000000 r9:85148680 r8:8027ed34 r7:eabb9e60 r6:85148700 r5:8517e000 Call trace: 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:8517ec00 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8513f180 INFO: task kworker/1:274:4215 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bc12f000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4217 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4217 tgid:4217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e48b5d84 r8:00000002 r7:60000113 r6:e48b5d8c r5:8517c800 r4:8517c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8517c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48b5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513f7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8517c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851b878c r4:851b8400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b878c r4:85148880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8517c800 r8:851488ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85148880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:276 state:D stack:0 pid:4219 tgid:4219 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85148980 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:4221 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:4221 tgid:4221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:85180000 r5:85180000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:82ac11e4 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:85180c00 r5:85180c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851b8b8c r4:851b8800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851b8b8c r4:85148b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85180c00 r8:85148bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85148b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85148b80 r8:8027ed34 r7:e48b5e60 r6:85148c00 r5:85180c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8513fa40 INFO: task kworker/1:278:4223 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bc8d7000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:279 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85181800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:851b8f8c r4:851b8c00 r4:85148c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85182400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851b938c r4:851b9000 r10:61c88647 r9:85182400 r8:85148dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bcd4c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:4229 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:85183000 r4:85183000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85183000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8513fe00 r7:ddde2d40 r6:83018200 r5:851b978c r4:85148e80 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r5:85183c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85183c00 r8:85148fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8513fdc0 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bd35c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4232 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabddd84 r8:00000002 r7:60000113 r6:eabddd8c r5:85184800 r4:85184800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85184800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabdde08 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:851b9b8c r4:85159080 dfa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0421dc0 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84949800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bd6cc000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eabedd84 r8:00000002 r7:60000013 r6:eabedd8c r5:8494c800 r5:8494c800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156200 r10:61c88647 r9:8494c800 r8:851591ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:285:4240 blocked for more than 457 seconds. r5:84948000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85159200 r8:8027ed34 r7:eabede60 r6:84bbcc80 r5:84948000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:286:4241 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:286 state:D stack:0 pid:4241 tgid:4241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:85185400 r4:85185400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85185400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85156340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85185400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ba78c r4:851ba400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ba78c r4:85159280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85185400 r8:851592ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159280 r8:8027ed34 r7:eabf5e60 r6:85159300 r5:85185400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe5fb0 to 0xeabe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85156240 INFO: task kworker/1:286:4241 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bdd17000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:85186c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:851bb38c r4:85159380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85186c00 r8:851593ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159380 r8:8027ed34 r7:eabf5e60 r6:85159400 r5:85186c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85156480 INFO: task kworker/1:287:4244 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: be042000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:D stack:0 pid:4245 tgid:4245 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85186000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:851baf8c r4:851bac00 r10:61c88647 r9:85186000 r8:851594ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159480 r8:8027ed34 r7:eabf1e60 r6:85159500 r5:85186000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85156480 INFO: task kworker/1:288:4245 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:4248 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:85188000 r4:85188000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85188000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851569c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85188000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85156980 INFO: task kworker/1:289:4248 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: be1fd000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:290 state:D stack:0 pid:4251 tgid:4251 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8921000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c438c r4:851c4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c438c r4:85159680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85188c00 r8:851596ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159680 r8:8027ed34 r7:eabfde60 r6:85159700 r5:85188c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85156900 INFO: task kworker/1:290:4251 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 1d60: 80000013 ffffffff r5:00001000 r4:eda69000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4252 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85189800 r4:829187f0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) 1d20: beb36000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8518a400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85159880 r8:8027ed34 r7:eac05e60 r6:85159900 r5:8518a400 INFO: task kworker/1:292:4253 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) task:kworker/1:293 state:D stack:0 pid:4256 tgid:4256 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8518b000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85159980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159980 r8:8027ed34 r7:eac05e60 r6:85159a00 r5:8518b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85156f80 INFO: task kworker/1:293:4256 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: bf228000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:4258 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r5:8518bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:851c478c r4:851c4400 r4:85159a80 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:4260 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8518c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 INFO: task kworker/1:295:4260 is blocked on a mutex likely owned by task kworker/0:176:3656. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:4262 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac1dd84 r8:00000002 r7:60000013 r6:eac1dd8c r5:8518d400 r4:8518d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8518d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851707c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8518d400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5f8c r4:851c5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5f8c r4:85159c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8518d400 r8:85159cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159c80 r8:8027ed34 r7:eac19e60 r6:85159d00 r5:8518d400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:4264 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:8518e000 r4:8518e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8518e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851702c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8518e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9d3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c538c r4:851c5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c538c r4:85159d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8518e000 r8:85159dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159d80 r8:8027ed34 r7:eac1de60 r6:85159e00 r5:8518e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r5:85d4778c r4:85d47400 r4:84ae2180 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8518ec00 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851704c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8518ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa2d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c578c r4:851c5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c578c r4:85159e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8518ec00 r8:85159eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159e80 r8:8027ed34 r7:eac1de60 r6:85159f00 r5:8518ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac25fb0 to 0xeac25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85170400 INFO: task kworker/1:298:4266 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c0121000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r4:84ae2180 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eac29d84 r8:00000002 r7:60000113 r6:eac29d8c r5:85190000 r5:85190000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85170580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85190000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c5b8c r4:851c5800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c5b8c r4:85159f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85190000 r8:85159fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85159f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85159f80 r8:8027ed34 r7:eac1de60 r6:851ed000 r5:85190000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851705c0 INFO: task kworker/1:299:4268 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85190c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:851ed080 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c0337000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4272 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:85191800 r4:85191800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85191800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r4:85170940 INFO: task kworker/1:301:4272 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c04b2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85192400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85170a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85192400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa95000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:851c678c r4:851ed280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0421dc0 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85193000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c084d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:85193c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:851ed480 r8:8027ed34 r7:eac11e60 r6:851ed500 r5:85193c00 INFO: task kworker/1:304:4279 is blocked on a mutex likely owned by task kworker/0:176:3656. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85194800 r4:829187f0 r4:00000000 r4:00000000 r5:851c7b8c r4:851c7800 r4:851ed580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:4282 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac45d84 r8:00000002 r7:60000013 r6:eac45d8c r5:85195400 r4:85195400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85195400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85195400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c778c r4:851c7400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c778c r4:851ed680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:306:4282 is blocked on a mutex likely owned by task kworker/0:176:3656. 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:4284 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:85196000 r4:85196000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85196000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85196000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaeb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851c7f8c r4:851c7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851c7f8c r4:851ed780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:851ed780 r8:8027ed34 r7:eac41e60 r6:851ed800 r5:85196000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:e0421dc0 r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4287 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:85196c00 r4:85196c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85196c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851ed880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:309:4288 blocked for more than 458 seconds. r5:85198000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85198000 r8:851ed9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851ed980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ed980 r8:8027ed34 r7:eac51e60 r6:851eda00 r5:85198000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac3dfb0 to 0xeac3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f62c0 INFO: task kworker/1:309:4288 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c154c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:4290 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eac55d84 r8:00000002 r7:60000013 r6:eac55d8c r5:85198c00 r5:85198c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac55e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85198c00 r8:851edaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85199800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6980 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85199800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ccf8c r4:851ccc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ccf8c r4:851edb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85199800 r8:851edbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851edb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851edb80 r8:8027ed34 r7:eac51e60 r6:851edc00 r5:85199800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f6540 INFO: task kworker/1:311:4291 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c1ed2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8519a400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6a40 r10:61c88647 r9:8519a400 r8:851edcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:4296 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:4296 tgid:4296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac61d84 r8:00000002 r7:60000013 r6:eac61d8c r5:8519b000 r4:8519b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8519b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8519b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffeb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cd78c r4:851cd400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cd78c r4:851edd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519b000 r8:851eddac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:84ae0100 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8519bc00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:851ce38c r4:851ce000 r10:00000000 r9:851ede80 r8:8027ed34 r7:eac61e60 r6:851edf00 r5:8519bc00 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c2146000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:4299 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:4299 tgid:4299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac6dd84 r8:00000002 r7:60000013 r6:eac6dd8c r5:8519c800 r4:8519c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8519c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac6de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8519c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eac69d84 r8:00000002 r7:60000013 r6:eac69d8c r5:8519d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8520c080 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:4304 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:8519e000 r4:8519e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8519e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852123c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8519e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06fb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ceb8c r4:851ce800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ceb8c r4:8520c180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519e000 r8:8520c1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520c180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520c180 r8:8027ed34 r7:eac65e60 r6:8520c200 r5:8519e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ae0100 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:80000013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:319:4309 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac7dd84 r8:00000002 r7:60000113 r6:eac7dd8c r5:851a0000 r4:851a0000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0719000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cef8c r4:851cec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cef8c r4:8520c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a0000 r8:8520c3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520c380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520c380 r8:8027ed34 r7:eac75e60 r6:8520c400 r5:851a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85212300 INFO: task kworker/1:319:4309 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c32fa000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851a0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:851a1800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cf38c r4:851cf000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cf38c r4:8520c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a1800 r8:8520c5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520c580 r8:8027ed34 r7:eac81e60 r6:8520c600 r5:851a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85212300 INFO: task kworker/1:321:4311 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c3866000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:322 state:D stack:0 pid:4314 tgid:4314 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851a3000 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:851a3000 r8:8520c6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:851a2400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851cff8c r4:851cfc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851cff8c r4:8520c780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a2400 r8:8520c7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520c780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520c780 r8:8027ed34 r7:eac89e60 r6:8520c800 r5:851a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85212980 INFO: task kworker/1:323:4317 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c3a4f000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:4318 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac91d84 r8:00000002 r7:60000013 r6:eac91d8c r5:851a3c00 r4:851a3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dcb8c r4:8520c880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a3c00 r8:8520c8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520c880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520c880 r8:8027ed34 r7:eac8de60 r6:8520c900 r5:851a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85212e80 INFO: task kworker/1:324:4318 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:80000013 r4:80239bd0 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851a5400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85212d40 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8947000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dc38c r4:851dc000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dc38c r4:8520c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a5400 r8:8520c9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520c980 r8:8027ed34 r7:eac91e60 r6:8520ca00 r5:851a5400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:851a6000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:4324 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac9dd84 r8:00000002 r7:60000113 r6:eac9dd8c r5:851a8000 r4:851a8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521db40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab37000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ddb8c r4:851dd800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ddb8c r4:8520cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a8000 r8:8520cbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520cb80 r8:8027ed34 r7:eac91e60 r6:8520cc00 r5:851a8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8521d2c0 INFO: task kworker/1:327:4324 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:328:4326 blocked for more than 458 seconds. r5:851a9800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8520cc80 r8:8027ed34 r7:eac9de60 r6:8520cd00 r5:851a9800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8521d780 INFO: task kworker/1:328:4326 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c42de000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851a8c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:329:4328 is blocked on a mutex likely owned by task kworker/0:176:3656. [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851aa400 r5:851aa400 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:851dd78c r4:8520ce80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaca5d84 r8:00000002 r7:60000013 r6:eaca5d8c r5:848c0c00 r4:848c0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521dc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ddf8c r4:851ddc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851ddf8c r4:8520cf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c0c00 r8:8520cfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520cf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520cf80 r8:8027ed34 r7:eac9de60 r6:84bbcd00 r5:848c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8521d8c0 INFO: task kworker/1:331:4332 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c51aa000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:00001000 r4:eda69000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:df94dd84 r8:00000002 r7:60000113 r6:df94dd8c r5:851abc00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:838e1380 r8:8027ed34 r7:eaca5e60 r6:8521a000 r5:851abc00 Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:851ac800 r5:851ac800 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851de38c r4:8521a080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ac800 r8:8521a0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a080 r8:8027ed34 r7:df94de60 r6:8521a100 r5:851ac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8521dbc0 INFO: task kworker/1:333:4336 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c5426000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:851ae000 r5:851ae000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:334:4339 is blocked on a mutex likely owned by task kworker/0:176:3656. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:851ab000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851dff8c r4:851dfc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:851dff8c r4:8521a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ab000 r8:8521a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a280 r8:8027ed34 r7:df94de60 r6:8521a300 r5:851ab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85221100 INFO: task kworker/1:335:4341 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c5a6d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:4342 blocked for more than 458 seconds. [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:848c0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:336:4342 is blocked on a mutex likely owned by task kworker/0:176:3656. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:337:4345 blocked for more than 458 seconds. r5:848c3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c67db000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:4348 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:848c3c00 r4:848c3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:848c3c00 r8:84bbceac r7:82804d40 r6:dddced40 r5:dddced60 r4:851fad40 r4:00000000 r4:82ac11e4 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c3f8c r4:84bbcf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c4800 r8:84bbcfac r7:82804d40 r6:dddced40 r5:dddced60 r4:84bbcf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bbcf80 r8:8027ed34 r7:eace5e60 r6:832a1b00 r5:848c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fa2c0 INFO: task kworker/0:278:4350 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c6d10000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:848c5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:851dfb8c r4:851df800 r10:00000000 r9:8521a500 r8:8027ed34 r7:eacd1e60 r6:8521f000 r5:848c5400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ead01d84 r8:00000002 r7:60000113 r6:ead01d8c r5:848c6000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:84739f8c r4:8521f080 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:280:4355 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:280 state:D stack:0 pid:4355 tgid:4355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead19d84 r8:00000002 r7:60000113 r6:ead19d8c r5:848c6c00 r4:848c6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473a38c r4:8473a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473a38c r4:8521f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c6c00 r8:8521f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8521f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521f180 r8:8027ed34 r7:ead01e60 r6:8521f200 r5:848c6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead19fb0 to 0xead19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8521b040 INFO: task kworker/0:280:4355 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c79f8000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 task:kworker/1:339 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:848c2400 r4:848c2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r5:8507ec00 r4:829187f0 r4:00000000 r4:00000000 r5:85260b8c r4:85260800 r10:00000000 r9:8521a600 r8:8027ed34 r7:ead1de60 r6:8521f300 r5:8507ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85221c40 INFO: task kworker/1:340:4359 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c7c75000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:341:4361 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:341 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df93dd84 r8:00000002 r7:60000013 r6:df93dd8c r5:8389a400 r4:8389a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8389a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df93de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8389a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526078c r4:85260400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526078c r4:8521a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8389a400 r8:8521a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a680 r8:8027ed34 r7:ead31e60 r6:8521f380 r5:8389a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4363 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:85009800 r4:85009800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85009800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85009800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85260f8c r4:85260c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85260f8c r4:8521a700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xead45fb0 to 0xead45ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84978000 r5:84978000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215180 r10:61c88647 r9:84978000 r8:8521a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85221fc0 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:4366 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:4366 tgid:4366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead51d84 r8:00000002 r7:60000113 r6:ead51d8c r5:84978c00 r4:84978c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84978c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8521dcc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84978c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead53000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526138c r4:85261000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526138c r4:8521a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84978c00 r8:8521a82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a800 r8:8027ed34 r7:ead4de60 r6:8521f500 r5:84978c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85221fc0 INFO: task kworker/1:344:4366 is blocked on a mutex likely owned by task kworker/0:176:3656. Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:84979800 r4:829187f0 r4:00000000 r4:00000000 r5:8526178c r4:85261400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: c8757000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:8497bc00 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215040 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c8757000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:347:4373 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:347 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead81d84 r8:00000002 r7:60000013 r6:ead81d8c r5:8497a400 r4:8497a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8497a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead83000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526238c r4:85262000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526238c r4:8521a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497a400 r8:8521a9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521a980 r8:8027ed34 r7:ead4de60 r6:8521f680 r5:8497a400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: c8b62000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8497d400 r5:8497d400 r4:829187f0 r4:00000000 r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 r10:61c88647 r9:8497d400 r8:8521aa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521aa00 r8:8027ed34 r7:ead81e60 r6:8521f700 r5:8497d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215280 INFO: task kworker/1:348:4375 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c8d07000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8497e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xead9dfb0 to 0xead9dff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8497b000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8521ab00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadbdd84 r8:00000002 r7:60000013 r6:eadbdd8c r5:85228c00 r4:85228c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85228c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85228c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadaf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85262f8c r4:85262c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85262f8c r4:8521ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228c00 r8:8521abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ab80 r8:8027ed34 r7:eada5e60 r6:8521f880 r5:85228c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852157c0 INFO: task kworker/1:351:4381 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c9276000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4382 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4382 tgid:4382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:85229800 r4:85229800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85229800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85229800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526338c r4:85263000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526338c r4:8521ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85229800 r8:8521ac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ac00 r8:8027ed34 r7:eada5e60 r6:8521f900 r5:85229800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215900 INFO: task kworker/1:352:4382 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c97da000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:8522b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8521ac80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215780 INFO: task kworker/1:353:4384 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c97da000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:4387 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eade1d84 r8:00000002 r7:60000013 r6:eade1d8c r5:8522a400 r4:8522a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85263f8c r4:85263c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85263f8c r4:8521ad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522a400 r8:8521ad2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ad00 r8:8027ed34 r7:eada5e60 r6:8521fa00 r5:8522a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade1fb0 to 0xeade1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215a40 INFO: task kworker/1:354:4387 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c9ce5000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4388 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4388 tgid:4388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadc9d84 r8:00000002 r7:60000013 r6:eadc9d8c r5:851aec00 r4:851aec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851aec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a1180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85264b8c r4:85264800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85264b8c r4:8521ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aec00 r8:8521adac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ad80 r8:8027ed34 r7:eade1e60 r6:8521ae00 r5:851aec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215a40 INFO: task kworker/1:355:4388 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c9ce5000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4391 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead0dd84 r8:00000002 r7:60000013 r6:ead0dd8c r5:848c1800 r4:848c1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85215e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526438c r4:85264000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526438c r4:8521ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c1800 r8:8521aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ae80 r8:8027ed34 r7:eadc9e60 r6:8521af00 r5:848c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85221fc0 INFO: task kworker/1:356:4391 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c9f74000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:4393 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead25d84 r8:00000002 r7:60000013 r6:ead25d8c r5:851ad400 r4:851ad400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851ad400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead25e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85221e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526478c r4:85264400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526478c r4:8521af80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ad400 r8:8521afac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8521af80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521af80 r8:8027ed34 r7:eadc9e60 r6:8521a480 r5:851ad400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead25fb0 to 0xead25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85215f00 INFO: task kworker/1:357:4393 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: c9f74000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:4395 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:4395 tgid:4395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae15d84 r8:00000002 r7:60000013 r6:eae15d8c r5:851a4800 r4:851a4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:851a4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a1540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:851a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85264f8c r4:85264c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85264f8c r4:8529d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a4800 r8:8529d02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d000 r8:8027ed34 r7:eadc9e60 r6:8529d080 r5:851a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a12c0 INFO: task kworker/1:358:4395 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ca3db000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:359:4397 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:359 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:85230000 r4:85230000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85230000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85230000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526678c r4:85266400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526678c r4:8529d100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230000 r8:8529d12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d100 r8:8027ed34 r7:eae15e60 r6:8529d180 r5:85230000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae1dfb0 to 0xeae1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a13c0 INFO: task kworker/1:359:4397 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ca3db000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4400 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4400 tgid:4400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae19d84 r8:00000002 r7:60000013 r6:eae19d8c r5:85230c00 r4:85230c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85230c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a1640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85230c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd6b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526538c r4:85265000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526538c r4:8529d200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230c00 r8:8529d22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d200 r8:8027ed34 r7:eae1de60 r6:8529d280 r5:85230c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a1500 INFO: task kworker/1:360:4400 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cacce000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:4403 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:4403 tgid:4403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:85231800 r4:85231800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85231800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a17c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85231800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0085000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526578c r4:85265400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526578c r4:8529d300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85231800 r8:8529d32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d300 r8:8027ed34 r7:eae1de60 r6:8529d380 r5:85231800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a1700 INFO: task kworker/1:361:4403 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cacce000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:4405 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae09d84 r8:00000002 r7:60000113 r6:eae09d8c r5:85232400 r4:85232400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85232400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a27c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d938c r4:852d9000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d938c r4:8521fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85232400 r8:8521faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8521fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fa80 r8:8027ed34 r7:ead01e60 r6:8529d400 r5:85232400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2440 INFO: task kworker/0:281:4405 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cb150000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:4406 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae25d84 r8:00000002 r7:60000113 r6:eae25d8c r5:85233000 r4:85233000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85233000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85233000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04b1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84739b8c r4:84739800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84739b8c r4:8521fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233000 r8:8521fb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8521fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fb00 r8:8027ed34 r7:eae09e60 r6:8529d480 r5:85233000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2300 INFO: task kworker/0:282:4406 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cb150000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:4407 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85233c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a1b80 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: cb72c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:283:4410 blocked for more than 459 seconds. Workqueue: events bpf_prog_free_deferred r5:85235400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85235400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85265f8c r4:85265c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85265f8c r4:8521fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85235400 r8:8521fbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8521fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fb80 r8:8027ed34 r7:eae09e60 r6:8529d600 r5:85235400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae2dfb0 to 0xeae2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2340 INFO: task kworker/0:283:4410 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cb72c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:4412 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae35d84 r8:00000002 r7:60000013 r6:eae35d8c r5:85236c00 r4:85236c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae35e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a1f80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85236c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0661000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8526638c r4:85266000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8526638c r4:8529d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236c00 r8:8529d6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d680 r8:8027ed34 r7:eae1de60 r6:8529d700 r5:85236c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae35fb0 to 0xeae35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a1f40 INFO: task kworker/1:363:4412 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cb72c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4413 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:85236000 r4:85236000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a26c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85236000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473978c r4:84739400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473978c r4:8521fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236000 r8:8521fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8521fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fc00 r8:8027ed34 r7:eae09e60 r6:8529d780 r5:85236000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2340 INFO: task kworker/0:284:4413 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85240000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:85240000 r8:8529d9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d980 r8:8027ed34 r7:eae1de60 r6:8529da00 r5:85240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529f100 INFO: task kworker/1:364:4417 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d20: cc25a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eae71d84 r8:00000002 r7:60000113 r6:eae71d8c r5:85240c00 r5:85240c00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:8521fc80 r8:8027ed34 r7:eae09e60 r6:8529db00 r5:85240c00 r4:82ac11e4 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:365:4419 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:365 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85241800 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0421d20 to 0xe0421d68) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:85243c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2c80 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a27c0 INFO: task kworker/0:286:4422 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cc25a000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85242400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85242400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48e3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85266f8c r4:85266c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85266f8c r4:8529dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85242400 r8:8529dcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529dc80 r8:8027ed34 r7:eae61e60 r6:8529dd00 r5:85242400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529f640 INFO: task kworker/1:366:4423 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ccaef000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eae99d84 r8:00000002 r7:60000113 r6:eae99d8c r5:85244800 r5:85244800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8529dd80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:85245400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fb00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85245400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e897b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85267b8c r4:85267800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85267b8c r4:8529de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85245400 r8:8529deac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529de80 r8:8027ed34 r7:eae99e60 r6:8529df00 r5:85245400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529f980 INFO: task kworker/1:368:4428 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ccaef000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85246000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:370:4432 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:370 state:D stack:0 pid:4432 tgid:4432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae21d84 r8:00000002 r7:60000013 r6:eae21d8c r5:85246c00 r4:85246c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85246c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fd00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85267f8c r4:85267c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85267f8c r4:8529d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85246c00 r8:8529d8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529d880 r8:8027ed34 r7:eaea9e60 r6:8529d900 r5:85246c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529fb40 INFO: task kworker/1:370:4432 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 1d60: 80000013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r5:85243000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85314000 r8:8027ed34 r7:eaea9e60 r6:85314080 r5:85243000 Workqueue: events bpf_prog_free_deferred 1d20: cd726000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:85d4778c r4:85d47400 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:287:4436 blocked for more than 459 seconds. r5:85248000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2f40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85248000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d8b8c r4:852d8800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d8b8c r4:8521fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248000 r8:8521fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8521fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521fd80 r8:8027ed34 r7:eae09e60 r6:85314100 r5:85248000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb9fb0 to 0xeaeb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2c40 INFO: task kworker/0:287:4436 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cd726000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4438 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeadd84 r8:00000002 r7:60000113 r6:eaeadd8c r5:8522ec00 r4:8522ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 r5:85274b8c r4:85274800 r10:61c88647 r9:8522ec00 r8:853141ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85316100 INFO: task kworker/1:372:4438 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cdc14000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8522e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316340 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85316100 r4:00000000 r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaec1d84 r8:00000002 r7:60000013 r6:eaec1d8c r5:8522bc00 r5:8522bc00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316780 r7:ddde2d40 r6:83018200 r5:8527578c r4:85314280 Exception stack(0xeaec1fb0 to 0xeaec1ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:288 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8522c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d8f8c r4:852d8c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d8f8c r4:8521ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522c800 r8:8521ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8521ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8521ff80 r8:8027ed34 r7:eae09e60 r6:838cdc80 r5:8522c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2f00 INFO: task kworker/0:288:4444 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cdc14000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4445 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:8522d400 r4:8522d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eab07000 r5:8527538c r4:85275000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527538c r4:85314300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522d400 r8:8531432c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85314300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85314300 r8:8027ed34 r7:eaec1e60 r6:838cdc00 r5:8522d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85316440 INFO: task kworker/1:375:4445 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ce254000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:289:4448 blocked for more than 459 seconds. r5:85228000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/0:290:4449 blocked for more than 459 seconds. r4:851a6c00 r5:851a6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed1e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a2880 INFO: task kworker/0:290:4449 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ce7b3000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:376:4452 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:376 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8497ec00 r5:8497ec00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 r10:61c88647 r9:8497ec00 r8:853143ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85316a00 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:82ac11e4 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4455 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaee9d84 r8:00000002 r7:60000013 r6:eaee9d8c r5:844e1800 r4:844e1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae11000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85275f8c r4:85275c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85275f8c r4:85314400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e1800 r8:8531442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85314400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85314400 r8:8027ed34 r7:eaedde60 r6:8529c280 r5:844e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853167c0 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844e2400 r4:829187f0 r4:00000000 r9:83018205 r8:844e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r10:61c88647 r9:844e2400 r8:853144ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85316980 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:379:4457 blocked for more than 459 seconds. r4:844e0000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85316bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae63000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8527638c r4:85276000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8527638c r4:85314500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e0000 r8:8531452c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85314500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85314500 r8:8027ed34 r7:eaeede60 r6:8529c380 r5:844e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85316d00 INFO: task kworker/1:379:4457 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cf342000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85248c00 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4462 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:8524a400 r4:8524a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8524a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a3e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8524a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffcf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dab8c r4:852da800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852dab8c r4:8529c400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524a400 r8:8529c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8529c400 r10:00000000 r9:8529c400 r8:8027ed34 r7:eaed1e60 r6:85314680 r5:8524a400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/0:292:4463 blocked for more than 460 seconds. r5:8524bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d9f8c r4:8529c480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524bc00 r8:8529c4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8529c480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529c480 r8:8027ed34 r7:eaf05e60 r6:85314700 r5:8524bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf01fb0 to 0xeaf01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a3800 INFO: task kworker/0:292:4463 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: cfcbf000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:293:4465 blocked for more than 460 seconds. r5:8524d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852da38c r4:8529c500 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4468 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4468 tgid:4468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:8524b000 r4:8524b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8524b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8529c580 r8:8027ed34 r7:eaf05e60 r6:8529c600 r5:8524b000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4471 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaed5d84 r8:00000002 r7:60000113 r6:eaed5d8c r5:844e3c00 r4:844e3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaed5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e07df000 r10:61c88647 r9:844e3c00 r8:8531482c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85214000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:382 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead79d84 r8:00000002 r7:60000113 r6:ead79d8c r5:844e4800 r4:844e4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85214bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e678c r4:852e6400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852e678c r4:85314880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e4800 r8:853148ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85314880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85314880 r8:8027ed34 r7:eaed5e60 r6:8529c700 r5:844e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85214000 Call trace: 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:844e6000 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:852daf8c r4:8529c780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e6000 r8:8529c7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8529c780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529c780 r8:8027ed34 r7:eaef1e60 r6:8529c800 r5:844e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a3f80 INFO: task kworker/0:295:4476 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d040d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:844e6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852db38c r4:8529c880 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:296:4477 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d040d000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:844e3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852db78c r4:8529c980 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4481 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4481 tgid:4481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead8dd84 r8:00000002 r7:60000013 r6:ead8dd8c r5:8497c800 r4:8497c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8497c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852204c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8497c800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dbf8c r4:852dbc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852dbf8c r4:8529ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8497c800 r8:8529caac r7:82804d40 r6:dddced40 r5:dddced60 r4:8529ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529ca80 r8:8027ed34 r7:eaef1e60 r6:8529cb00 r5:8497c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85220280 INFO: task kworker/0:298:4481 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4483 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:85238000 r4:85238000 r5:85238000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8473ab8c r4:8529cb80 Exception stack(0xeada9fb0 to 0xeada9ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85238c00 r4:829187f0 r4:00000000 r4:00000000 r5:852e4f8c r4:852e4c00 r10:00000000 r9:8529cc00 r8:8027ed34 r7:eada9e60 r6:85314980 r5:85238c00 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d0b35000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4487 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4487 tgid:4487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf35d84 r8:00000002 r7:60000013 r6:eaf35d8c r5:85239800 r4:85239800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85239800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8529cc80 r8:8027ed34 r7:eadd9e60 r6:85314a00 r5:85239800 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8523a400 r5:8523a400 r4:829187f0 r4:00000000 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8951000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e478c r4:852e4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e478c r4:8529cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523a400 r8:8529cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8529cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529cd00 r8:8027ed34 r7:eadd9e60 r6:85314a80 r5:8523a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852207c0 INFO: task kworker/0:302:4489 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d0de8000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8523bc00 r5:8523bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r5:00001000 r4:e8977000 r10:61c88647 r9:8523bc00 r8:8529cdac r7:82804d40 r6:dddced40 r5:dddced60 r4:852207c0 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:8523b000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8529ce00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4494 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:8523c800 r4:8523c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e5f8c r4:852e5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e5f8c r4:8529ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523c800 r8:8529ceac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8529ce80 r8:8027ed34 r7:eaf4de60 r6:85314c00 r5:8523c800 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4497 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4497 tgid:4497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf5dd84 r8:00000002 r7:60000013 r6:eaf5dd8c r5:8523d400 r4:8523d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85220d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e578c r4:852e5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e578c r4:8529cf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523d400 r8:8529cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8529cf00 r10:00000000 r9:8529cf00 r8:8027ed34 r7:eaf51e60 r6:85314c80 r5:8523d400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaf65d84 r8:00000002 r7:60000013 r6:eaf65d8c r5:838b6c00 r5:838b6c00 r4:829187f0 r4:00000000 r9:83018005 r8:838b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r4:8529cf80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0421fb0 to 0xe0421ff8) task:kworker/0:308 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 task:kworker/0:309 state:D stack:0 pid:4502 tgid:4502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf6dd84 r8:00000002 r7:60000113 r6:eaf6dd8c r5:8523e000 r4:8523e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf6de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85202480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e6b8c r4:852e6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e6b8c r4:851ff080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523e000 r8:851ff0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851ff080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ff080 r8:8027ed34 r7:eaf69e60 r6:851ff100 r5:8523e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85220400 INFO: task kworker/0:309:4502 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d19fc000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8524c800 r5:8524c800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8527738c r4:85314e00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8524ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85202540 r10:61c88647 r9:8524ec00 r8:851ff22c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d1dd5000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8524e000 r5:8524e000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:851ff300 r8:8027ed34 r7:eaf29e60 r6:851ff380 r5:8524e000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:312:4512 blocked for more than 460 seconds. r5:85249800 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851ff400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:844e0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844e0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf79e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85202ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e7b8c r4:852e7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e7b8c r4:851ff500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844e0c00 r8:851ff52c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ff500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ff500 r8:8027ed34 r7:eaf59e60 r6:851ff580 r5:844e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85202880 INFO: task kworker/0:313:4513 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d2b91000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:844e5400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:315:4517 blocked for more than 460 seconds. r5:85130000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 r5:00001000 r4:ead47000 r10:61c88647 r9:85130000 r8:851ff72c r7:82804d40 r6:dddced40 r5:dddced60 r4:85202bc0 INFO: task kworker/0:315:4517 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d3268000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:316:4519 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:316 state:D stack:0 pid:4519 tgid:4519 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf85d84 r8:00000002 r7:60000113 r6:eaf85d8c r5:85130c00 r4:85130c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85130c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018005 r8:85130c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85130c00 r8:851ff82c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85131800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:852ed38c r4:852ed000 r4:00000001 r4:85202f40 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:318:4523 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:85132400 r4:85132400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85132400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852021c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85132400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ecb8c r4:852ec800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ecb8c r4:851ffa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85132400 r8:851ffa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ffa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ffa00 r8:8027ed34 r7:eaf89e60 r6:851ffa80 r5:85132400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85214e00 INFO: task kworker/0:318:4523 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d3722000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:319 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85133c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85171240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85133c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ed78c r4:852ed400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ed78c r4:851ffc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85133c00 r8:851ffc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ffc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ffc00 r8:8027ed34 r7:eaf89e60 r6:851ffc80 r5:85133c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85171100 INFO: task kworker/0:320:4527 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d3c31000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85134800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:dddced40 r6:83018000 r5:852edf8c r4:851ffd00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:322:4531 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:322 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf9dd84 r8:00000002 r7:60000013 r6:eaf9dd8c r5:85135400 r4:85135400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85135400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851713c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85135400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852edb8c r4:852ed800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852edb8c r4:851ffe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85135400 r8:851ffe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851ffe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ffe00 r8:8027ed34 r7:eaf99e60 r6:851ffe80 r5:85135400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:323:4533 blocked for more than 460 seconds. r5:85136000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa1e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:851fff00 r8:8027ed34 r7:eaf99e60 r6:851fff80 r5:85136000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4534 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf75d84 r8:00000002 r7:60000013 r6:eaf75d8c r5:85120000 r4:85120000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85120000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851716c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85120000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ee38c r4:852ee000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ee38c r4:85169000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85120000 r8:8516902c r7:82804d40 r6:dddced40 r5:dddced60 r4:85169000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85169000 r8:8027ed34 r7:eafa1e60 r6:85169080 r5:85120000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85120c00 r5:85120c00 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeafa5fb0 to 0xeafa5ff8) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:326 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafa9d84 r8:00000002 r7:60000113 r6:eafa9d8c r5:85121800 r4:85121800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85121800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85171e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85121800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf25000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ef38c r4:852ef000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ef38c r4:85169200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85121800 r8:8516922c r7:82804d40 r6:dddced40 r5:dddced60 r4:85169200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85169200 r8:8027ed34 r7:eafa5e60 r6:85169280 r5:85121800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85171940 INFO: task kworker/0:326:4539 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d4968000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ae2180 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:85123000 r4:85123000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85123000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:852eef8c r4:85169300 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85123c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85171f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85123c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ef78c r4:852ef400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852ef78c r4:85169400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85123c00 r8:8516942c r7:82804d40 r6:dddced40 r5:dddced60 r4:85169400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85169400 r8:8027ed34 r7:eafa9e60 r6:85169480 r5:85123c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d100 INFO: task kworker/0:328:4548 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:4549 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae3dd84 r8:00000002 r7:60000113 r6:eae3dd8c r5:85124800 r4:85124800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85124800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae3de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85124800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 r7:dddced40 r6:83018000 r5:852efb8c r4:85169500 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:330:4550 blocked for more than 461 seconds. r5:85125400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85125400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 r10:61c88647 r9:85125400 r8:8516962c r7:82804d40 r6:dddced40 r5:dddced60 r4:8515d100 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d5132000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:4551 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:4551 tgid:4551 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafc5d84 r8:00000002 r7:60000113 r6:eafc5d8c r5:85126000 r4:85126000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85126000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc5e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85169700 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85126c00 r5:85126c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85126c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f4f8c r4:852f4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f4f8c r4:85169800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85126c00 r8:8516982c r7:82804d40 r6:dddced40 r5:dddced60 r4:85169800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85169800 r8:8027ed34 r7:eafc1e60 r6:85169880 r5:85126c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d100 INFO: task kworker/0:332:4553 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d542c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85122400 r5:85122400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515d100 INFO: task kworker/0:333:4554 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d59b4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 task:kworker/0:334 state:D stack:0 pid:4555 tgid:4555 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84910000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r5:00001000 r4:eaaa5000 r4:85169a00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4558 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4558 tgid:4558 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafd9d84 r8:00000002 r7:60000113 r6:eafd9d8c r5:84911800 r4:84911800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84911800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9cc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84911800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48d7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277f8c r4:85277c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85277f8c r4:85314e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84911800 r8:85314eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85314e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85314e80 r8:8027ed34 r7:eaed5e60 r6:85169b00 r5:84911800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9d00 INFO: task kworker/1:384:4558 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafddd84 r8:00000002 r7:60000013 r6:eafddd8c r5:84912400 r4:84912400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84912400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84912400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0833000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85277b8c r4:85277800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85277b8c r4:85314f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84912400 r8:85314f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85314f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85314f00 r8:8027ed34 r7:eafd9e60 r6:85169b80 r5:84912400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9d00 INFO: task kworker/1:385:4559 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d5f92000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84913000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162040 r10:61c88647 r9:84913000 r8:85314fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851e9f40 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:4563 tgid:4563 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:84913c00 r4:84913c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84913c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84913c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8915000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473af8c r4:8473ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8473af8c r4:85158000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84913c00 r8:8515802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85158000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158000 r8:8027ed34 r7:eafe9e60 r6:85169c80 r5:84913c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9f40 INFO: task kworker/1:387:4563 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d62ea000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r5:80000013 r4:80239bd0 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84910c00 r4:829187f0 r4:00000000 r4:00000000 r5:8528038c r4:85280000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e9700 INFO: task kworker/1:388:4565 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d62ea000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe0421fb0 to 0xe0421ff8) task:kworker/1:389 state:D stack:0 pid:4567 tgid:4567 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84916000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85158100 Exception stack(0xeaffdfb0 to 0xeaffdff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:84916c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851625c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84916c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528138c r4:85281000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528138c r4:85158180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84916c00 r8:851581ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85158180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158180 r8:8027ed34 r7:eafe9e60 r6:85169e00 r5:84916c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85162080 INFO: task kworker/1:390:4570 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d6a40000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:391:4571 blocked for more than 461 seconds. r5:84915400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84915400 r8:8515822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84914800 r5:84914800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8528178c r4:85158280 dfa0: 00000000 00000000 00000000 00000000 r4:851621c0 INFO: task kworker/1:392:4573 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d7200000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:335:4575 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:335 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaff9d84 r8:00000002 r7:60000113 r6:eaff9d8c r5:84a58000 r4:84a58000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a58000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a58000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f538c r4:852f5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f538c r4:85169f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58000 r8:85169fac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 r4:85165080 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:84a58c00 r4:84a58c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a58c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c6440 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f6b8c r4:852f6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f6b8c r4:8515f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58c00 r8:8515f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8515f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515f080 r8:8027ed34 r7:eaff9e60 r6:8515f100 r5:84a58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd5fb0 to 0xeafd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851652c0 INFO: task kworker/0:336:4578 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:337:4579 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:337 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:84a59800 r4:84a59800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a59800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851654c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a59800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab11000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8515f180 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a5a400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162740 r7:ddde2d40 r6:83018200 r5:85281b8c r4:85158300 Exception stack(0xeb011fb0 to 0xeb011ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4585 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:84a5bc00 r4:84a5bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85165d40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a5bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 r5:852f5b8c r4:852f5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:338:4585 is blocked on a mutex likely owned by task kworker/0:176:3656. r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:394:4587 blocked for more than 461 seconds. r5:84a5d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r5:00001000 r4:eaea5000 r10:61c88647 r9:84a5d400 r8:851583ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85162700 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:395:4589 blocked for more than 461 seconds. r4:84a5b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85162a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a5b000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528238c r4:85282000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528238c r4:85158400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5b000 r8:8515842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85158400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158400 r8:8027ed34 r7:eb025e60 r6:8515f480 r5:84a5b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85162840 INFO: task kworker/1:395:4589 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d8239000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a5c800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8528338c r4:85158480 Exception stack(0xeb035fb0 to 0xeb035ff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:4592 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb039d84 r8:00000002 r7:60000013 r6:eb039d8c r5:85320000 r4:85320000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85320000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 r4:84ae2180 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:4593 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:398 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85162b40 INFO: task kworker/1:398:4593 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d882e000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:8491bc00 r8:851586ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85158680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158680 r8:8027ed34 r7:eb035e60 r6:85158700 r5:8491bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85162c40 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:400 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e9940 Exception stack(0xeb045fb0 to 0xeb045ff8) INFO: task kworker/1:400:4598 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:401:4600 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 r5:8491e000 r4:829187f0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:00000001 r4:84ae0100 r5:8491ec00 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851731c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8491ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb063000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85283f8c r4:85283c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:84ae2180 INFO: task kworker/1:403:4603 blocked for more than 461 seconds. r5:84918c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85173180 INFO: task kworker/1:403:4603 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: d97a0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 Exception stack(0xe0421fb0 to 0xe0421ff8) task:kworker/1:404 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:84918000 r4:84918000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84918000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:85d4778c r4:85d47400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:339:4607 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:84919800 r4:84919800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84919800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r7:dddced40 r6:83018000 r5:852f678c r4:8515f600 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:4609 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:8491b000 r4:829187f0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r5:00001000 r4:eda69000 Exception stack(0xe0421fb0 to 0xe0421ff8) Workqueue: events bpf_prog_free_deferred r5:85234800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85234800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb095000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85284f8c r4:85158e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85234800 r8:85158e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85158e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158e00 r8:8027ed34 r7:eb079e60 r6:85158e80 r5:85234800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85250000 r5:85250000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:eb0a7000 r4:00000001 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4615 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:408 state:D stack:0 pid:4615 tgid:4615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0a5d84 r8:00000002 r7:60000013 r6:eb0a5d8c r5:85250c00 r4:85250c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85250c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:85285b8c r4:85285800 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85252400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eb000 r7:ddde2d40 r6:83018200 r5:8528578c r4:8516f100 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:410:4620 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:410 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0c1d84 r8:00000002 r7:60000013 r6:eb0c1d8c r5:85253c00 r4:85253c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85253c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eb400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85253c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85285f8c r4:85285c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85285f8c r4:8516f200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85253c00 r8:8516f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f200 r8:8027ed34 r7:eb0a5e60 r6:8516f280 r5:85253c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:411 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4624 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0d9d84 r8:00000002 r7:60000013 r6:eb0d9d8c r5:85255400 r4:85255400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85255400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8528678c r4:8516f400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:413:4626 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:4626 tgid:4626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb019d84 r8:00000002 r7:60000013 r6:eb019d8c r5:85321800 r4:85321800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85321800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ebc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85321800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa53000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528778c r4:85287400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528778c r4:8516f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85321800 r8:8516f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f500 r8:8027ed34 r7:eb0d9e60 r6:8515f680 r5:85321800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eb800 INFO: task kworker/1:413:4626 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r4:e0421dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85322400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85286b8c r4:85286800 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:4629 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0edd84 r8:00000002 r7:60000013 r6:eb0edd8c r5:85323000 r4:85323000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85323000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eba80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85323000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85286f8c r4:85286c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85286f8c r4:8516f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323000 r8:8516f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f600 r8:8027ed34 r7:eb019e60 r6:8515f780 r5:85323000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851eb940 INFO: task kworker/1:415:4629 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ebb80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85323c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528738c r4:85287000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528738c r4:8516f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85323c00 r8:8516f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f680 r8:8027ed34 r7:eb019e60 r6:8515f800 r5:85323c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:416:4632 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dbced000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85324800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:417:4634 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dc152000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 r4:00000001 INFO: task kworker/1:418:4635 blocked for more than 461 seconds. r5:85256000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ebd80 r10:61c88647 r9:85256000 r8:8516f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0421fb0 to 0xe0421ff8) task:kworker/1:419 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85253000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0705000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528c78c r4:8528c400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528c78c r4:8516f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85253000 r8:8516f8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f880 r8:8027ed34 r7:eb109e60 r6:8516f900 r5:85253000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85173f80 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85256c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85256c00 r8:8516f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: dc59c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85251800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f71c0 r10:61c88647 r9:85251800 r8:8516faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7140 INFO: task kworker/1:421:4642 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dc902000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4644 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:8491a400 r4:8491a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8491a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7340 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r5:85136c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f74c0 r10:61c88647 r9:85136c00 r8:8516fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:4648 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:4648 tgid:4648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb121d84 r8:00000002 r7:60000113 r6:eb121d8c r5:85258000 r4:85258000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85258000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8528d78c r4:8516fd80 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85258c00 r5:85258c00 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85258c00 r8:8516feac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:4652 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb129d84 r8:00000002 r7:60000113 r6:eb129d8c r5:85259800 r4:85259800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85259800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85259800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528e38c r4:8528e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528e38c r4:8516ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85259800 r8:8516ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8516ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516ff80 r8:8027ed34 r7:eb125e60 r6:8520a000 r5:85259800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7580 INFO: task kworker/1:426:4652 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dd340000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) task:kworker/1:427 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8525a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7880 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528df8c r4:8528dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528df8c r4:8520a080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525a400 r8:8520a0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:428:4656 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:428 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb131d84 r8:00000002 r7:60000113 r6:eb131d8c r5:8525b000 r4:8525b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528e78c r4:8528e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528e78c r4:8520a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525b000 r8:8520a1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a180 r8:8027ed34 r7:eb129e60 r6:8520a200 r5:8525b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f79c0 INFO: task kworker/1:428:4656 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8525c800 r5:8525c800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528ef8c r4:8528ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528ef8c r4:8520a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525c800 r8:8520a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a280 r8:8027ed34 r7:eb131e60 r6:8520a300 r5:8525c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7c00 INFO: task kworker/1:429:4658 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dd7b7000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ae2180 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8525d400 r5:8525d400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8525d400 r8:8520a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:4663 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:8525e000 r4:8525e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8525e000 r8:8520a4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0421d20 to 0xe0421d68) r4:82ac11e4 r4:e0421dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4664 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4664 tgid:4664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb145d84 r8:00000002 r7:60000013 r6:eb145d8c r5:8525ec00 r4:8525ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528f38c r4:8528f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528f38c r4:8520a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525ec00 r8:8520a5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a580 r8:8027ed34 r7:eb135e60 r6:8520a600 r5:8525ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222240 INFO: task kworker/1:432:4664 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: ddbc1000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4665 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb13dd84 r8:00000002 r7:60000013 r6:eb13dd8c r5:8525bc00 r4:8525bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8525bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8525bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528fb8c r4:8528f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528fb8c r4:8520a680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8525bc00 r8:8520a6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a680 r8:8027ed34 r7:eb135e60 r6:8520a700 r5:8525bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222240 INFO: task kworker/1:433:4665 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: de0b4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r4:82ac11e4 r4:e0421dc0 r4:00000000 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:85d4778c r4:85d47400 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:434:4668 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:434 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb149d84 r8:00000002 r7:60000113 r6:eb149d8c r5:85350000 r4:85350000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85350000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222b80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85350000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c478c r4:852c4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c478c r4:8520a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350000 r8:8520a7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a780 r8:8027ed34 r7:eb13de60 r6:8520a800 r5:85350000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852225c0 INFO: task kworker/1:434:4668 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: de3b2000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4670 blocked for more than 462 seconds. task:kworker/1:435 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eb151d84 r8:00000002 r7:60000113 r6:eb151d8c r5:85350c00 r4:85350c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85350c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85350c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead65000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8528ff8c r4:8528fc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8528ff8c r4:8520a880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85350c00 r8:8520a8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a880 r8:8027ed34 r7:eb149e60 r6:8520a900 r5:85350c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222680 INFO: task kworker/1:435:4670 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: de7d6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:4671 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb155d84 r8:00000002 r7:60000113 r6:eb155d8c r5:85325400 r4:85325400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85325400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85325400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c438c r4:852c4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c438c r4:8520a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85325400 r8:8520a9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520a980 r8:8027ed34 r7:eb149e60 r6:8515f900 r5:85325400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852228c0 INFO: task kworker/1:436:4671 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: de7d6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:4675 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb165d84 r8:00000002 r7:60000113 r6:eb165d8c r5:85326000 r4:85326000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85326000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85326000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c4b8c r4:852c4800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c4b8c r4:8520aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85326000 r8:8520aa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520aa00 r8:8027ed34 r7:eb149e60 r6:8515f980 r5:85326000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222c00 INFO: task kworker/1:437:4675 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: de7d6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:438:4677 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r5:84a5ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222dc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c4f8c r4:852c4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c4f8c r4:8520aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5ec00 r8:8520aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520aa80 r8:8027ed34 r7:eb165e60 r6:8515fa00 r5:84a5ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222bc0 INFO: task kworker/1:438:4677 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: de7d6000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:4678 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:84a5e000 r4:84a5e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf39000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c5b8c r4:852c5800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c5b8c r4:8520ab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5e000 r8:8520ab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520ab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ab00 r8:8027ed34 r7:eb16de60 r6:8515fa80 r5:84a5e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222bc0 INFO: task kworker/1:439:4678 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dec5c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ae0100 Not tainted 6.15.0-syzkaller #0 task:kworker/1:440 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb17dd84 r8:00000002 r7:60000013 r6:eb17dd8c r5:84938c00 r4:84938c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84938c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84938c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c538c r4:852c5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c538c r4:8520ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938c00 r8:8520abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ab80 r8:8027ed34 r7:eb171e60 r6:8515fb00 r5:84938c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85222e40 INFO: task kworker/1:440:4680 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: dec5c000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:4683 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:84939800 r4:84939800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84939800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84939800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c578c r4:852c5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c578c r4:8520ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84939800 r8:8520ac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ac00 r8:8027ed34 r7:eb171e60 r6:8515fb80 r5:84939800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7f80 INFO: task kworker/1:441:4683 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: df584000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r5:85d4778c r4:85d47400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:4685 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:4685 tgid:4685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:8493a400 r4:8493a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8493a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf61000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c638c r4:852c6000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c638c r4:8520ac80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493a400 r8:8520acac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520ac80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ac80 r8:8027ed34 r7:eb171e60 r6:8515fc00 r5:8493a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531c100 INFO: task kworker/1:442:4685 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: df9fb000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4687 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb18dd84 r8:00000002 r7:60000013 r6:eb18dd8c r5:8493b000 r4:8493b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c240 r4:00000000 r9:83018205 r8:8493b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:443:4687 is blocked on a mutex likely owned by task kworker/0:176:3656. Exception stack(0xe0421d20 to 0xe0421d68) r4:82ac11e4 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d47b8c r4:85d47800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d47b8c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:4688 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8493bc00 r4:8493bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8493bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0fd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c678c r4:852c6400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c678c r4:8520ad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493bc00 r8:8520adac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520ad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ad80 r8:8027ed34 r7:eb189e60 r6:8515fd00 r5:8493bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531c200 INFO: task kworker/1:444:4688 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4691 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb195d84 r8:00000002 r7:60000113 r6:eb195d8c r5:8493c800 r4:8493c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb197000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8520ae00 r8:8027ed34 r7:eb191e60 r6:8515fd80 r5:8493c800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4693 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4693 tgid:4693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1a1d84 r8:00000002 r7:60000013 r6:eb1a1d8c r5:8493d400 r4:8493d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8493d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c6f8c r4:852c6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c6f8c r4:8520ae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493d400 r8:8520aeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520ae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520ae80 r8:8027ed34 r7:eb195e60 r6:8515fe00 r5:8493d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531c580 INFO: task kworker/1:446:4693 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4695 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4695 tgid:4695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1add84 r8:00000002 r7:60000013 r6:eb1add8c r5:8493ec00 r4:8493ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c9c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8493ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c778c r4:852c7400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c778c r4:8520af00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493ec00 r8:8520af2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8520af00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8520af00 r8:8027ed34 r7:eb1a1e60 r6:8515fe80 r5:8493ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531c740 INFO: task kworker/1:447:4695 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:4696 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb159d84 r8:00000002 r7:60000013 r6:eb159d8c r5:85351800 r4:85351800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85351800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531c800 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85351800 r8:8520afac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531c740 INFO: task kworker/1:448:4696 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4700 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1a9d84 r8:00000002 r7:60000013 r6:eb1a9d8c r5:85353000 r4:85353000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85353000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531cac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85353000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c7b8c r4:852c7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c7b8c r4:8531b080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85353000 r8:8531b0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b080 r8:8027ed34 r7:eb1ade60 r6:8531b100 r5:85353000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531c900 INFO: task kworker/1:449:4700 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4701 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1c1d84 r8:00000002 r7:60000013 r6:eb1c1d8c r5:85353c00 r5:85353c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531cdc0 r5:00001000 r4:eb1d7000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531cbc0 INFO: task kworker/1:450:4701 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4703 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1cdd84 r8:00000002 r7:60000013 r6:eb1cdd8c r5:85354800 r4:85354800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85354800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ccc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85354800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852c7f8c r4:852c7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852c7f8c r4:8531b280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85354800 r8:8531b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b280 r8:8027ed34 r7:eb1c1e60 r6:8531b300 r5:85354800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531cc80 INFO: task kworker/1:451:4703 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4705 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4705 tgid:4705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:85355400 r4:85355400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85355400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85222fc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85355400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85388b8c r4:85388800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85388b8c r4:8531b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85355400 r8:8531b3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b380 r8:8027ed34 r7:eb1c1e60 r6:8531b400 r5:85355400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:4707 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:4707 tgid:4707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:85356000 r4:85356000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85356000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eea40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85356000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538878c r4:85388400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538878c r4:8531b480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356000 r8:8531b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b480 r8:8027ed34 r7:eb1d5e60 r6:8531b500 r5:85356000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531ce80 INFO: task kworker/1:453:4707 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:4709 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1e9d84 r8:00000002 r7:60000113 r6:eb1e9d8c r5:85356c00 r4:85356c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85356c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85356c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85388f8c r4:85388c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85388f8c r4:8531b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85356c00 r8:8531b5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b580 r8:8027ed34 r7:eb1d5e60 r6:8531b600 r5:85356c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6100 INFO: task kworker/1:454:4709 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:849a538c r4:849a5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb201d84 r8:00000002 r7:60000113 r6:eb201d8c r5:85352400 r4:85352400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85352400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b61c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85352400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538938c r4:85389000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538938c r4:8531b680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85352400 r8:8531b6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b680 r8:8027ed34 r7:eb1e9e60 r6:8531b700 r5:85352400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6240 INFO: task kworker/1:455:4711 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:4713 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:4713 tgid:4713 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85358000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85358000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538978c r4:85389400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538978c r4:8531b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85358000 r8:8531b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b780 r8:8027ed34 r7:eb201e60 r6:8531b800 r5:85358000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb209fb0 to 0xeb209ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6180 INFO: task kworker/1:456:4713 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4715 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb215d84 r8:00000002 r7:60000013 r6:eb215d8c r5:85358c00 r4:85358c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85358c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b69c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85358c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e058b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538a38c r4:8538a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538a38c r4:8531b880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85358c00 r8:8531b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b880 r8:8027ed34 r7:eb209e60 r6:8531b900 r5:85358c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6340 INFO: task kworker/1:457:4715 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d60: 900d0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af8400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4717 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4717 tgid:4717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:85359800 r4:85359800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85359800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85359800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc81000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85389b8c r4:85389800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85389b8c r4:8531b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85359800 r8:8531b9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531b980 r8:8027ed34 r7:eb215e60 r6:8531ba00 r5:85359800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6440 INFO: task kworker/1:458:4717 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:459 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8535a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8535a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0467000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85389f8c r4:85389c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85389f8c r4:8531ba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535a400 r8:8531baac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531ba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531ba80 r8:8027ed34 r7:eb215e60 r6:8531bb00 r5:8535a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6440 INFO: task kworker/1:459:4718 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 Call trace: r5:8535bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e07a5000 r5:8538a78c r4:8538a400 r10:61c88647 r9:8535bc00 r8:8531bbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4723 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafe1d84 r8:00000002 r7:60000013 r6:eafe1d8c r5:8535d400 r4:8535d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6cc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8535d400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0807000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538ab8c r4:8538a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538ab8c r4:8531bc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535d400 r8:8531bcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531bc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531bc80 r8:8027ed34 r7:eafb9e60 r6:8531bd00 r5:8535d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b6a40 INFO: task kworker/1:461:4723 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:4725 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:8535e000 r4:8535e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8535e000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e48eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538af8c r4:8538ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538af8c r4:8531bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535e000 r8:8531bdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531bd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531bd80 r8:8027ed34 r7:eafe1e60 r6:8531be00 r5:8535e000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:852b6c80 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8535c800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:8535c800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r7:ddde2d40 r6:83018200 r5:8538b78c r4:8531be80 r10:00000000 r9:8531be80 r8:8027ed34 r7:eb031e60 r6:8531bf00 r5:8535c800 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0425d20 to 0xe0425d68) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:4729 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:4729 tgid:4729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb219d84 r8:00000002 r7:60000013 r6:eb219d8c r5:84938000 r4:84938000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84938000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf000 r5:00001000 r4:e8933000 r7:ddde2d40 r6:83018200 r5:8538b38c r4:8531bf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938000 r8:8531bfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8531bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531bf80 r8:8027ed34 r7:eb059e60 r6:8515ff00 r5:84938000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852bf100 INFO: task kworker/1:464:4729 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8493e000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8493e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538bf8c r4:8538bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538bf8c r4:852ba000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493e000 r8:852ba02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba000 r8:8027ed34 r7:eb059e60 r6:8515ff80 r5:8493e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852bf1c0 INFO: task kworker/1:465:4730 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:4733 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:4733 tgid:4733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf15d84 r8:00000002 r7:60000113 r6:eaf15d8c r5:85326c00 r4:85326c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85326c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85326c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538bb8c r4:8538b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8538bb8c r4:852ba080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85326c00 r8:852ba0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba080 r8:8027ed34 r7:eb21de60 r6:852c2000 r5:85326c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf15fb0 to 0xeaf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4736 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb22dd84 r8:00000002 r7:60000013 r6:eb22dd8c r5:85338c00 r4:85338c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85338c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85338c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab13000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539438c r4:85394000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539438c r4:852ba100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85338c00 r8:852ba12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba100 r8:8027ed34 r7:eb21de60 r6:852c2080 r5:85338c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb22dfb0 to 0xeb22dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852bf540 INFO: task kworker/1:467:4736 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:4738 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:8533a400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85395f8c r4:852ba180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533a400 r8:852ba1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba180 r8:8027ed34 r7:eb22de60 r6:852c2100 r5:8533a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852bf5c0 INFO: task kworker/1:468:4738 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:4740 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:469 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb255d84 r8:00000002 r7:60000013 r6:eb255d8c r5:85338000 r4:85338000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85338000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bf740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85338000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539478c r4:85394400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85338000 r8:852ba22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb255fb0 to 0xeb255ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:4741 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb25dd84 r8:00000002 r7:60000113 r6:eb25dd8c r5:8533bc00 r4:8533bc00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:8533bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 r5:85394b8c r4:85394800 r10:61c88647 r9:8533bc00 r8:852ba2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba280 r8:8027ed34 r7:eb235e60 r6:852c2200 r5:8533bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852bf780 INFO: task kworker/1:470:4741 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:471:4743 blocked for more than 462 seconds. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85394f8c r4:85394c00 r4:00000001 r4:852bf880 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:4746 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb271d84 r8:00000002 r7:60000013 r6:eb271d8c r5:8533c800 r4:8533c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bfb00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8533c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539538c r4:85395000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852ba380 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85339800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r4:852ba400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:4750 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb281d84 r8:00000002 r7:60000013 r6:eb281d8c r5:8533d400 r4:8533d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852bfe00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8533d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf23000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85395b8c r4:85395800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85395b8c r4:852ba480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533d400 r8:852ba4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba480 r8:8027ed34 r7:eb235e60 r6:852c2400 r5:8533d400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:4752 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:4752 tgid:4752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:85360c00 r4:85360c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85360c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85396b8c r4:85396800 r10:00000000 r9:852ba600 r8:8027ed34 r7:eb221e60 r6:852ba680 r5:85361800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85362400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb027000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539678c r4:85396400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539678c r4:852ba700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85362400 r8:852ba72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852ba700 r8:8027ed34 r7:eb27de60 r6:852ba780 r5:85362400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d21c0 INFO: task kworker/1:477:4756 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4757 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb28dd84 r8:00000002 r7:60000013 r6:eb28dd8c r5:85363000 r4:85363000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85363000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85363000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85396f8c r4:85396c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85396f8c r4:852ba800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85363000 r8:852ba82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852ba800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:479:4761 blocked for more than 462 seconds. r5:85363c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8539738c r4:852ba900 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb295fb0 to 0xeb295ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85397f8c r4:85397c00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4766 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb29dd84 r8:00000002 r7:60000013 r6:eb29dd8c r5:85366000 r4:85366000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d2740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85366000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85397b8c r4:85397800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85397b8c r4:852bac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85366000 r8:852bac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:483:4768 blocked for more than 462 seconds. r5:85366c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85366c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r4:852bad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bad00 r8:8027ed34 r7:eb299e60 r6:852bad80 r5:85366c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d29c0 INFO: task kworker/1:483:4768 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8539c78c r4:852baf00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4774 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2b1d84 r8:00000002 r7:60000013 r6:eb2b1d8c r5:85368c00 r4:85368c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85368c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85368c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539cf8c r4:8539cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539cf8c r4:853df000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85368c00 r8:853df02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df000 r8:8027ed34 r7:eb2a1e60 r6:853df080 r5:85368c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d2ec0 INFO: task kworker/1:486:4774 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7f57b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da3c0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539d38c r4:8539d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539d38c r4:853df100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536a400 r8:853df12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df100 r8:8027ed34 r7:eb2b1e60 r6:853df180 r5:8536a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853da240 INFO: task kworker/1:487:4777 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:00001000 r4:dffd1000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c6180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8533ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2db000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539e38c r4:8539e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8539e38c r4:852c2480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533ec00 r8:852c24ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852c2480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:4780 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2b9d84 r8:00000002 r7:60000013 r6:eb2b9d8c r5:8533e000 r4:8533e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8533e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b9e08 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8533e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb211000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539d78c r4:8539d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539d78c r4:853df200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8533e000 r8:853df22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df200 r8:8027ed34 r7:eb2b5e60 r6:852c2580 r5:8533e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d60: 900d0013 ffffffff r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:4782 tgid:4782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:85320c00 r4:85320c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85320c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2bde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85320c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539db8c r4:8539d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85320c00 r8:853df2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df280 r8:8027ed34 r7:eb2b9e60 r6:852c2600 r5:85320c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853da480 INFO: task kworker/1:489:4782 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84880c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853da700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84880c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539df8c r4:8539dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539df8c r4:853df300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d1fb0 to 0xeb2d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853da600 INFO: task kworker/1:490:4784 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:491:4786 blocked for more than 463 seconds. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dabc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84880000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4787 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4787 tgid:4787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb225d84 r8:00000002 r7:60000013 r6:eb225d8c r5:85369800 r4:85369800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85369800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb225e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dab40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85369800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539e78c r4:8539e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539e78c r4:853df400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85369800 r8:853df42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df400 r8:8027ed34 r7:eb2d9e60 r6:853df480 r5:85369800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/0:341:4790 blocked for more than 463 seconds. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb31f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f6f8c r4:852f6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f6f8c r4:852c2780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84882400 r8:852c27ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852c2780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c2780 r8:8027ed34 r7:eafd5e60 r6:852c2800 r5:84882400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 900d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:493:4792 blocked for more than 463 seconds. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853dacc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84883000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539ef8c r4:8539ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539ef8c r4:853df500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84883000 r8:853df52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df500 r8:8027ed34 r7:eb2d9e60 r6:852c2880 r5:84883000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:84883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 r4:853df580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:00001000 r4:dffd1000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:495 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:84884800 r4:84884800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84884800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84884800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539f78c r4:8539f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539f78c r4:853df600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84884800 r8:853df62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df600 r8:8027ed34 r7:eb301e60 r6:852c2980 r5:84884800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853daec0 INFO: task kworker/1:495:4797 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4799 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4799 tgid:4799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:84885400 r4:84885400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84885400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:849a538c r4:849a5000 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:497 state:D stack:0 pid:4800 tgid:4800 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb311000 r10:61c88647 r9:84886000 r8:853df72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853d8140 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:852f738c r4:852c2b00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:849a538c r4:849a5000 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:852f7b8c r4:852c2c00 Exception stack(0xeb329fb0 to 0xeb329ff8) Workqueue: events bpf_prog_free_deferred 5d60: 900d0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:4806 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:85370000 r4:85370000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85370000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d83c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85370000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb333000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539ff8c r4:8539fc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8539ff8c r4:853df780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85370000 r8:853df7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df780 r8:8027ed34 r7:eb315e60 r6:852c2d00 r5:85370000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d8340 INFO: task kworker/1:498:4806 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r4:85372400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:eb33d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a438c r4:853a4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a438c r4:853df800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85372400 r8:853df82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df800 r8:8027ed34 r7:eb315e60 r6:852c2e00 r5:85372400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d85c0 INFO: task kworker/1:499:4809 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:849a538c r4:849a5000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:85373000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eaf49000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:853e0600 Exception stack(0xe0425d20 to 0xe0425d68) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4812 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:85373c00 r4:85373c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85373c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb365d84 r8:00000002 r7:60000013 r6:eb365d8c r5:85371800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb365e08 r9:83018205 r8:85371800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 r10:61c88647 r9:85371800 r8:853df92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:502:4815 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:502 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:85370c00 r4:85370c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85370c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d8840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85370c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a4f8c r4:853a4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a4f8c r4:853df980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85370c00 r8:853df9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853df980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853df980 r8:8027ed34 r7:eb315e60 r6:853e8000 r5:85370c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d8980 INFO: task kworker/1:502:4815 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:85374800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 r10:61c88647 r9:85374800 r8:853dfa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4819 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1b9d84 r8:00000002 r7:60000013 r6:eb1b9d8c r5:85375400 r4:85375400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85375400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d8b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85375400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a578c r4:853a5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a578c r4:853dfa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85375400 r8:853dfaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853dfa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dfa80 r8:8027ed34 r7:eb315e60 r6:853e8100 r5:85375400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853d8940 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85376000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:853d8a40 Call trace: 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:4823 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb395d84 r8:00000002 r7:60000013 r6:eb395d8c r5:84a00c00 r4:84a00c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a00c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a00c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a00c00 r8:853dfbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853dfb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dfb80 r8:8027ed34 r7:eb38de60 r6:853e8200 r5:84a00c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d8c00 INFO: task kworker/1:506:4823 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a02400 r8:853dfc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb3a1d84 r8:00000002 r7:60000113 r6:eb3a1d8c r5:84a00000 r5:84a00000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d8100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a00000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0781000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a678c r4:853a6400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a678c r4:853dfd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a00000 r8:853dfd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:853dfd00 r8:8027ed34 r7:eb395e60 r6:853e8300 r5:84a00000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4829 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4829 tgid:4829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:84a03c00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:853a6f8c r4:853dfd80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r4:84a03000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:511:4833 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3cdd84 r8:00000002 r7:60000113 r6:eb3cdd8c r5:84a04800 r4:84a04800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a04800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3cde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e93c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a04800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacaf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a778c r4:853a7400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a778c r4:853dfe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a04800 r8:853dfeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853dfe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853dfe80 r8:8027ed34 r7:eb395e60 r6:853e8480 r5:84a04800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e9200 INFO: task kworker/1:511:4833 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:512:4835 blocked for more than 463 seconds. task:kworker/1:512 state:D stack:0 pid:4835 tgid:4835 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:84a05400 r4:84a05400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a05400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:853a8b8c r4:853a8800 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4837 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb399d84 r8:00000002 r7:60000013 r6:eb399d8c r5:8536bc00 r4:8536bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8536bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e95c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8536bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:84af1fc0 task:kworker/1:514 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853f6080 r8:8027ed34 r7:eb3d5e60 r6:853f6100 r5:8536d400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:515:4842 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:515 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb341d84 r8:00000002 r7:60000113 r6:eb341d8c r5:8536e000 r4:8536e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8536e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9880 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8536e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a878c r4:853a8400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:4844 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:8536ec00 r4:8536ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8536ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8536ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:853a938c r4:853f6380 Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:518:4848 blocked for more than 463 seconds. r10:829187f4 r9:eb3edd84 r8:00000002 r7:60000013 r6:eb3edd8c r5:8535b000 r4:8535b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8535b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fe000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8535b000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf31000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a9b8c r4:853a9800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a9b8c r4:853f6480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8535b000 r8:853f64ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853f6480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f6480 r8:8027ed34 r7:eb3e1e60 r6:853f6500 r5:8535b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e0f00 INFO: task kworker/1:518:4848 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 7fd87000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 900d0013 ffffffff r5:900d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:519:4850 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:519 state:D stack:0 pid:4850 tgid:4850 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb3f1d84 r8:00000002 r7:60000013 r6:eb3f1d8c r5:85378000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e0e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85378000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a978c r4:853a9400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853a978c r4:853f6580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85378000 r8:853f65ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853f6580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f6580 r8:8027ed34 r7:eb3ede60 r6:853f6600 r5:85378000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:900d0013 r4:80239bd0 r4:e0425dc0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:520:4853 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:520 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8537a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aa38c r4:853aa000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853aa38c r4:853f6680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8537a400 r8:853f66ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853f6680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f6680 r8:8027ed34 r7:eb3ede60 r6:853f6700 r5:8537a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fe100 INFO: task kworker/1:520:4853 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) r4:82ac11e4 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:521 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:853f6780 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547b040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85379800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473bb8c r4:8473b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473bb8c r4:853e8580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85379800 r8:853e85ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853e8580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8580 r8:8027ed34 r7:eb329e60 r6:853f6880 r5:85379800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb409d84 r8:00000002 r7:60000113 r6:eb409d8c r5:8537bc00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb409e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8537bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb45b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b1f8c r4:853b1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:853b1f8c r4:853e8600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8537bc00 r8:853e862c r7:82804d40 r6:dddced40 r5:dddced60 r4:853e8600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e8600 r8:8027ed34 r7:eb405e60 r6:853f6900 r5:8537bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb409fb0 to 0xeb409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f5880 INFO: task kworker/0:346:4858 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853feb80 r10:61c88647 r9:8537c800 r8:853f69ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fe880 INFO: task kworker/1:522:4861 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fea40 r7:ddde2d40 r6:83018200 r5:853aab8c r4:853f6a80 dfa0: 00000000 00000000 00000000 00000000 Call trace: r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:4865 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:524 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb419d84 r8:00000002 r7:60000013 r6:eb419d8c r5:84a06c00 r4:84a06c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a06c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fec40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:00001000 r4:eb183000 r10:61c88647 r9:84a06c00 r8:853f6bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8537e000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fed80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:853abf8c r4:853abc00 r10:00000000 r9:853f6e00 r8:8027ed34 r7:eb411e60 r6:853f6e80 r5:8537b000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:4873 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb425d84 r8:00000002 r7:60000013 r6:eb425d8c r5:8536c800 r4:8536c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8536c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85448200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8536c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b078c r4:853b0400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b078c r4:853f6f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536c800 r8:853f6f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853f6f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f6f00 r8:8027ed34 r7:eb421e60 r6:853f6f80 r5:8536c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb425fb0 to 0xeb425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fe500 INFO: task kworker/1:528:4873 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dffd1000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:529 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85448140 INFO: task kworker/1:529:4875 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854b8c00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:854b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r4:8544a100 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d60: 800d0013 ffffffff r4:e0425dc0 r4:00000000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854484c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b0f8c r4:853b0c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b0f8c r4:8544a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:8544a22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8544a200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8544a200 r8:8027ed34 r7:eb42de60 r6:8544a280 r5:854ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85448540 INFO: task kworker/1:531:4880 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:853b138c r4:8544a300 dfa0: 00000000 00000000 00000000 00000000 Call trace: r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:533:4883 blocked for more than 464 seconds. [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545a100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb489000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b338c r4:853b3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b338c r4:8544a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8000 r8:8544a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8544a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8544a400 r8:8027ed34 r7:eb41de60 r6:8544a480 r5:854b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854486c0 INFO: task kworker/1:533:4883 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:4884 blocked for more than 464 seconds. r10:829187f4 r9:eb441d84 r8:00000002 r7:60000013 r6:eb441d8c r5:854bbc00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:853b178c r4:853b1400 r10:00000000 r9:8544a500 r8:8027ed34 r7:eb44de60 r6:8544a580 r5:854bbc00 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0425dc0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb461000 r10:61c88647 r9:854bd400 r8:8544a72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85448c40 Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4891 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:854be000 r4:854be000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854be000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854626c0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r4:00000000 r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85448ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb46f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b278c r4:853b2400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b278c r4:8544a880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854bec00 r8:8544a8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8544a880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8544a880 r8:8027ed34 r7:eb44de60 r6:8544a900 r5:854bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85448f00 INFO: task kworker/1:537:4893 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e9f00 r10:61c88647 r9:854b9800 r8:8544a9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853d8f80 Call trace: 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:539:4897 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:539 state:D stack:0 pid:4897 tgid:4897 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb481d84 r8:00000002 r7:60000113 r6:eb481d8c r5:854c0000 r4:854c0000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545a040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb483000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b2f8c r4:853b2c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:853b2f8c r4:8544aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c0000 r8:8544aaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8544aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8544aa80 r8:8027ed34 r7:eb44de60 r6:8544ab00 r5:854c0000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547c38c r4:8547c000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8547c38c r4:8544ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c1800 r8:8544abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8544ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8544ab80 r8:8027ed34 r7:eb44de60 r6:8544ac00 r5:854c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545a140 INFO: task kworker/1:540:4898 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:541:4901 blocked for more than 464 seconds. r5:854c0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545a440 r7:ddde2d40 r6:83018200 r5:853b378c r4:8544ac80 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:542:4902 blocked for more than 464 seconds. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8544ad80 r8:8027ed34 r7:eb495e60 r6:8544ae00 r5:854c3000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545a000 INFO: task kworker/1:542:4902 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:4906 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:543 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb48dd84 r8:00000002 r7:60000013 r6:eb48dd8c r5:854c3c00 r4:854c3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545a7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Call trace: r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 r4:854c4800 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545aac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547c78c r4:8547c400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8547c78c r4:8544af80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c4800 r8:8544afac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8544af80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8544af80 r8:8027ed34 r7:eb495e60 r6:85460000 r5:854c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8545a900 INFO: task kworker/1:544:4907 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c5400 r5:854c5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545ac40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547cb8c r4:8547c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8547cb8c r4:85460080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c5400 r8:854600ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:854c6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545ae00 r10:61c88647 r9:854c6000 r8:854601ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854c2400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8547d78c r4:85460280 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:548:4915 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:548 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4f1d84 r8:00000002 r7:60000113 r6:eb4f1d8c r5:84a01800 r4:84a01800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a01800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8547d38c r4:85460380 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:4917 blocked for more than 464 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854c6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r5:00001000 r4:e07c1000 r10:61c88647 r9:854c6c00 r8:8546042c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85468100 INFO: task kworker/1:549:4917 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4919 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:848e8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8547db8c r4:8547d800 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0425dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb239d84 r8:00000002 r7:60000013 r6:eb239d8c r5:848e8c00 r4:848e8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848e8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85468440 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85460500 r4:854682c0 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:552 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848ea400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb269e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85468580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:848ea400 r8:854605ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0425d20 to 0xe0425d68) r4:00000000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:00000000 r9:85460600 r8:8027ed34 r7:eb4f5e60 r6:853e8a00 r5:848ec800 r4:00000000 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:554 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb4e5d84 r8:00000002 r7:60000013 r6:eb4e5d8c r5:854c8c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r10:61c88647 r9:854c8c00 r8:8546072c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:854c9800 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:849a538c r4:849a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:557:4934 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:557 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4fdd84 r8:00000002 r7:60000013 r6:eb4fdd8c r5:854ca400 r4:854ca400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ca400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:558 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f078c r4:854f0400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f078c r4:85460a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e9800 r8:85460a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460a00 r8:8027ed34 r7:eb4fde60 r6:853e8b00 r5:848e9800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85468f40 INFO: task kworker/1:558:4936 is blocked on a mutex likely owned by task kworker/1:102:3666. Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:559 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:848ed400 r4:848ed400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ed400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 800d0013 ffffffff r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4939 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4939 tgid:4939 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:848eec00 r5:848eec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:854f038c r4:854f0000 r4:85460b00 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4941 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb51dd84 r8:00000002 r7:60000013 r6:eb51dd8c r5:848ebc00 r4:848ebc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ebc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f0f8c r4:854f0c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f0f8c r4:85460b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ebc00 r8:85460bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460b80 r8:8027ed34 r7:eb50de60 r6:853e8c80 r5:848ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb51dfb0 to 0xeb51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a100 INFO: task kworker/1:561:4941 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:562:4943 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:562 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:848ee000 r4:848ee000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ee000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb049000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f0b8c r4:854f0800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f0b8c r4:85460c00 r10:61c88647 r9:848ee000 r8:85460c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4945 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb501d84 r8:00000002 r7:60000113 r6:eb501d8c r5:84800000 r4:84800000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84800000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552f040 r5:854fd78c r4:854fd400 r4:853e8d80 1fa0: 00000000 00000000 00000000 00000000 Call trace: r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:349:4946 blocked for more than 464 seconds. r5:84800c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547b000 INFO: task kworker/0:349:4946 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4949 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84802400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547bf40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84802400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb227000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473b38c r4:8473b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473b38c r4:853e8f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84802400 r8:853e8fac r7:82804d40 r6:dddced40 r5:dddced60 r4:853e8f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:00001000 r4:dffd1000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:563:4952 blocked for more than 464 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:84803c00 r4:84803c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84803c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a4c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84803c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb081000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f138c r4:854f1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f138c r4:85460c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84803c00 r8:85460cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460c80 r8:8027ed34 r7:eb51de60 r6:85477080 r5:84803c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a380 INFO: task kworker/1:563:4952 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:800d0013 r4:80239bd0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:564:4954 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:564 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:84803000 r4:84803000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84803000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a8c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84803000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0bb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f1f8c r4:854f1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f1f8c r4:85460d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84803000 r8:85460d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460d00 r8:8027ed34 r7:eb531e60 r6:85477100 r5:84803000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a440 INFO: task kworker/1:564:4954 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0425dc0 r5:00001000 r4:dffd1000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:565 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84801800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84801800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb091000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f178c r4:854f1400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f178c r4:85460d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84801800 r8:85460dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460d80 r8:8027ed34 r7:eb539e60 r6:85477180 r5:84801800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a440 INFO: task kworker/1:565:4955 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:566:4958 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:566 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb545d84 r8:00000002 r7:60000113 r6:eb545d8c r5:84806000 r4:84806000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84806000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84806000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f1b8c r4:854f1800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f1b8c r4:85460e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84806000 r8:85460e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460e00 r8:8027ed34 r7:eb539e60 r6:85477200 r5:84806000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb545fb0 to 0xeb545ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a700 INFO: task kworker/1:566:4958 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000000 r5:00001000 r4:dffd1000 r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:4959 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:4959 tgid:4959 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb549d84 r8:00000002 r7:60000013 r6:eb549d8c r5:84806c00 r4:84806c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84806c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547ad40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb231000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f2b8c r4:854f2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f2b8c r4:85460e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84806c00 r8:85460eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460e80 r8:8027ed34 r7:eb539e60 r6:85477280 r5:84806c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a980 INFO: task kworker/1:567:4959 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:568:4961 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:568 state:D stack:0 pid:4961 tgid:4961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb551d84 r8:00000002 r7:60000113 r6:eb551d8c r5:84805400 r5:84805400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547a700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84805400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0db000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f238c r4:854f2000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f238c r4:85460f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84805400 r8:85460fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460f80 r8:8027ed34 r7:eb549e60 r6:85477300 r5:84805400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547a840 INFO: task kworker/1:568:4961 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:4963 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4963 tgid:4963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:85380c00 r4:85380c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85380c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547abc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85380c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f278c r4:854f2400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f278c r4:85460f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85380c00 r8:85460f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85460f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85460f00 r8:8027ed34 r7:eb549e60 r6:85477380 r5:85380c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547ac80 INFO: task kworker/1:569:4963 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4967 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4967 tgid:4967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:854cd400 r4:854cd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8547aec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f2f8c r4:854f2c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f2f8c r4:85532000 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d60: 800d0013 ffffffff r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85381800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8547bf00 r4:00000000 r5:800d0013 r4:80239bd0 r4:00000000 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:571:4970 blocked for more than 464 seconds. r5:85382400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f338c r4:85532100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85382400 r8:8553212c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532100 r8:8027ed34 r7:eb529e60 r6:85477500 r5:85382400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8547ae00 INFO: task kworker/1:571:4970 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85383000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:573:4974 blocked for more than 464 seconds. r5:854cc800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:85530140 Call trace: 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4976 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb569d84 r8:00000002 r7:60000013 r6:eb569d8c r5:854cb000 r4:854cb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85530480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854f3f8c r4:854f3c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854f3f8c r4:85532300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cb000 r8:8553232c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532300 r8:8027ed34 r7:eb561e60 r6:85532380 r5:854cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85530280 INFO: task kworker/1:574:4976 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 804e1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854c8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb2ef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fc38c r4:854fc000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fc38c r4:85532400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8000 r8:8553242c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532400 r8:8027ed34 r7:eb569e60 r6:85532480 r5:854c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85530680 INFO: task kworker/1:575:4979 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:4980 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:854ce000 r5:854ce000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:577:4982 blocked for more than 464 seconds. r5:85376c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85530880 INFO: task kworker/1:577:4982 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854cbc00 r5:854cbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85530d00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb321000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fcf8c r4:854fcc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fcf8c r4:85532700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cbc00 r8:8553272c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532700 r8:8027ed34 r7:eb555e60 r6:85532780 r5:854cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854d0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb57dfb0 to 0xeb57dff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:580:4988 blocked for more than 464 seconds. r4:854d1800 r5:854d1800 r4:829187f0 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:854fdb8c r4:85532900 1fa0: 00000000 00000000 00000000 00000000 r4:8552f000 INFO: task kworker/1:580:4988 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:352:4989 blocked for more than 464 seconds. r5:854d2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:581:4990 blocked for more than 464 seconds. r5:854d3000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854d3000 r8:85532a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532a00 r8:8027ed34 r7:eb581e60 r6:85532b00 r5:854d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f000 INFO: task kworker/1:581:4990 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:4994 blocked for more than 464 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854d4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552f5c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb371000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fdf8c r4:854fdc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fdf8c r4:85532b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d4800 r8:85532bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532b80 r8:8027ed34 r7:eb589e60 r6:85532c00 r5:854d4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f600 INFO: task kworker/1:582:4994 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:854d5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb58dd84 r8:00000002 r7:60000013 r6:eb58dd8c r5:854d3c00 r5:854d3c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85532d80 dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:585:4999 blocked for more than 464 seconds. r4:854d6000 r5:854d6000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552fc40 r10:61c88647 r9:854d6000 r8:85532eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:5002 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:854d6c00 r4:854d6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85539000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead21000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854fff8c r4:854ffc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854fff8c r4:85532f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d6c00 r8:85532fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85532f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85532f80 r8:8027ed34 r7:eb58de60 r6:85533000 r5:854d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb575fb0 to 0xeb575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552fc00 INFO: task kworker/1:586:5002 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854d0000 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552fe40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ff38c r4:854ff000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:854ff38c r4:85533080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d0000 r8:855330ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85533080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533080 r8:8027ed34 r7:eb575e60 r6:85533100 r5:854d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552f780 INFO: task kworker/1:587:5003 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:854cec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85533180 r8:8027ed34 r7:eb575e60 r6:85533200 r5:854cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8552fe80 INFO: task kworker/1:588:5005 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:5008 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:5008 tgid:5008 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:84a06000 r4:84a06000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a06000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85530740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:590 state:D stack:0 pid:5010 tgid:5010 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854d8000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85533380 r8:8027ed34 r7:eb575e60 r6:85533400 r5:854d8000 INFO: task kworker/1:590:5010 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:5011 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:591 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854d8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8550478c r4:85504400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85539300 r4:00000000 r5:800d0013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854d9800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85539600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85504f8c r4:85504c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85504f8c r4:85533580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d9800 r8:855335ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85533580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533580 r8:8027ed34 r7:eb5ade60 r6:85533600 r5:854d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85539340 INFO: task kworker/1:592:5015 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854da400 r5:854da400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:5018 tgid:5018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:854db000 r4:854db000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854db000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85539800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854db000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550538c r4:85505000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8550538c r4:85533780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854db000 r8:855337ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85533780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533780 r8:8027ed34 r7:eb5b1e60 r6:85533800 r5:854db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85539580 INFO: task kworker/1:594:5018 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:5019 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:854dbc00 r4:854dbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854dbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85539ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550578c r4:85505400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8550578c r4:85533880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dbc00 r8:855338ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85533880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533880 r8:8027ed34 r7:eb5a5e60 r6:85533900 r5:854dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85539580 INFO: task kworker/1:595:5019 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854dc800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854dc800 r8:855339ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855399c0 r4:00000000 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r5:849a538c r4:849a5000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:597:5023 blocked for more than 465 seconds. [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854de000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:5026 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:598 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:854dec00 r4:854dec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854dec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf980 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb179000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85505f8c r4:85505c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85505f8c r4:85533b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dec00 r8:85533bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85533b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854dd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf8c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8550638c r4:85506000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8550638c r4:85533c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dd400 r8:85533cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85533c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533c80 r8:8027ed34 r7:eb5c9e60 r6:85533d00 r5:854dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85468240 INFO: task kworker/1:599:5028 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85383c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:5031 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:85386000 r4:85386000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85386000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855418c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85386000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00a3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542038c r4:85420000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542038c r4:85477700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85386000 r8:8547772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85477700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477700 r8:8027ed34 r7:eb535e60 r6:85477780 r5:85386000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85386c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:354:5038 blocked for more than 465 seconds. r5:85385400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554dc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85385400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542138c r4:85421000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542138c r4:85477880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85385400 r8:854778ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85477880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477880 r8:8027ed34 r7:eb535e60 r6:85477900 r5:85385400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855419c0 INFO: task kworker/0:354:5038 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:5040 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85384800 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85384800 r8:854779ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85477980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85477980 r8:8027ed34 r7:eb455e60 r6:85477a00 r5:85384800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855419c0 INFO: task kworker/0:355:5040 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84804800 r4:829187f0 r4:00000000 r4:00000000 r5:8550738c r4:85507000 r10:00000000 r9:85533e80 r8:8027ed34 r7:eb5d1e60 r6:85477a80 r5:84804800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:848f0c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85533f00 r8:8027ed34 r7:eb5d1e60 r6:85477b00 r5:848f0c00 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:604:5045 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:604 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5edd84 r8:00000002 r7:60000013 r6:eb5edd8c r5:848f1800 r4:848f1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:605:5046 blocked for more than 465 seconds. r5:848f2400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85546000 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:606:5050 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:606 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f5d84 r8:00000002 r7:60000013 r6:eb5f5d8c r5:848f3000 r4:848f3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554bd80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551038c r4:85510000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551038c r4:85546080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f3000 r8:855460ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85546080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85546080 r8:8027ed34 r7:eb5f1e60 r6:85477c80 r5:848f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f5fb0 to 0xeb5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554bd00 INFO: task kworker/1:606:5050 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:607:5052 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:607 state:D stack:0 pid:5052 tgid:5052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f9d84 r8:00000002 r7:60000113 r6:eb5f9d8c r5:848f3c00 r4:848f3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554b2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:85510f8c r4:85546100 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:848f4800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85546180 r8:8027ed34 r7:eb5f9e60 r6:85477d80 r5:848f4800 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:848f5400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85546200 r8:8027ed34 r7:eb5f9e60 r6:85477e00 r5:848f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554b040 INFO: task kworker/1:609:5056 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 80af6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:848f6000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85546280 r8:8027ed34 r7:eb601e60 r6:85477e80 r5:848f6000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:848f6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85546300 r8:8027ed34 r7:eb605e60 r6:85477f00 r5:848f6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85543240 INFO: task kworker/1:611:5059 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:612:5062 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:612 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:848f0000 r4:848f0000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:612:5062 is blocked on a mutex likely owned by task kworker/1:102:3666. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848f8000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848f8000 r8:8554642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:614:5066 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:614 state:D stack:0 pid:5066 tgid:5066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:848f8c00 r4:848f8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85543680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848fb000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85546500 r8:8027ed34 r7:eb615e60 r6:8554c100 r5:848fb000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:616:5070 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:616 state:D stack:0 pid:5070 tgid:5070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb625d84 r8:00000002 r7:60000013 r6:eb625d8c r5:848f9800 r4:848f9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85550040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85513f8c r4:85513c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85513f8c r4:85546580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f9800 r8:855465ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85546580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85546580 r8:8027ed34 r7:eb621e60 r6:8554c180 r5:848f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85543780 INFO: task kworker/1:616:5070 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) r5:800d0013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848fc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85512f8c r4:85512c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85543780 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854e3000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85543bc0 r10:61c88647 r9:854e3000 r8:855467ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85543cc0 INFO: task kworker/1:619:5076 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:5078 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb639d84 r8:00000002 r7:60000113 r6:eb639d8c r5:854e4800 r4:854e4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb639e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554b180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead85000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85513b8c r4:85513800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85513b8c r4:85546880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e4800 r8:855468ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85546880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85546880 r8:8027ed34 r7:eb625e60 r6:85546900 r5:854e4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85543e40 INFO: task kworker/1:620:5078 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854e2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85514f8c r4:85546980 r4:85546980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85546980 r8:8027ed34 r7:eb625e60 r6:85546a00 r5:854e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85550000 INFO: task kworker/1:621:5081 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:5083 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:854e5400 r4:854e5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854e5400 r8:85546aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb63dfb0 to 0xeb63dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855502c0 INFO: task kworker/1:622:5083 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:623:5086 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:623 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:854e6000 r4:854e6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85550380 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85546b80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:5087 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb645d84 r8:00000002 r7:60000113 r6:eb645d8c r5:854e6c00 r4:854e6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:854e6c00 r8:85546cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855502c0 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:625:5089 blocked for more than 465 seconds. r5:848fbc00 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85546d80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:626:5091 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:626 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:848fa400 r4:848fa400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fa400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85550840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb229000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551578c r4:85515400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551578c r4:85546e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fa400 r8:85546e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85546e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85546e00 r8:8027ed34 r7:eb651e60 r6:8554c300 r5:848fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85550740 INFO: task kworker/1:626:5091 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:848fe000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85516b8c r4:85546e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 r10:61c88647 r9:848fd400 r8:85546f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:356:5096 blocked for more than 465 seconds. task:kworker/0:356 state:D stack:0 pid:5096 tgid:5096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb631d84 r8:00000002 r7:60000113 r6:eb631d8c r5:848fec00 r4:848fec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848fec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cfa80 r9:83018005 r8:848fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:8554c480 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:849a538c r4:849a5000 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb665d84 r8:00000002 r7:60000113 r6:eb665d8c r5:84950000 r4:84950000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84950000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554d580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84950000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb285000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542178c r4:85421400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542178c r4:8554c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950000 r8:8554c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8554c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8554c580 r8:8027ed34 r7:eb631e60 r6:8554c600 r5:84950000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554dd80 INFO: task kworker/0:357:5097 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84950c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85557040 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85515b8c r4:8554c680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950c00 r8:8554c6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8554c680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8554c680 r8:8027ed34 r7:eb631e60 r6:8554c700 r5:84950c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8554d740 INFO: task kworker/0:358:5100 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84951800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84951800 r8:8554c7ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:84952400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8554c880 r8:8027ed34 r7:eb669e60 r6:8554c900 r5:84952400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85557080 INFO: task kworker/0:360:5104 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:629:5107 blocked for more than 465 seconds. r4:84953000 r5:84953000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85550f40 INFO: task kworker/1:629:5107 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:5108 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:84953c00 r4:84953c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84953c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84954800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8542278c r4:8554cb00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:630 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb681d84 r8:00000002 r7:60000013 r6:eb681d8c r5:84955400 r4:84955400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84955400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:84955400 r8:8553f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5fa0: 00000000 00000000 00000000 00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb381000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85422b8c r4:85422800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85422b8c r4:8554cc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956000 r8:8554ccac r7:82804d40 r6:dddced40 r5:dddced60 r4:8554cc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8554cc80 r8:8027ed34 r7:eb66de60 r6:8554cd00 r5:84956000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb67dfb0 to 0xeb67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85557680 INFO: task kworker/0:363:5114 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84956c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:84956c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848b8000 r5:848b8000 r4:829187f0 r4:00000000 r9:83018205 r8:848b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r4:8553f080 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:632:5121 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:632 state:D stack:0 pid:5121 tgid:5121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:848b8c00 r4:848b8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848b8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855404c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551738c r4:85517000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551738c r4:8553f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b8c00 r8:8553f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553f100 r8:8027ed34 r7:eb68de60 r6:8554cf00 r5:848b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:848b9800 r4:829187f0 r4:00000000 r5:8551778c r4:85517400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:634:5125 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:848ba400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85517b8c r4:8553f200 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855409c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa91000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551838c r4:85518000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551838c r4:8553f280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bb000 r8:8553f2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553f280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553f280 r8:8027ed34 r7:eb699e60 r6:85544080 r5:848bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85540740 INFO: task kworker/1:635:5127 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:848bbc00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8553f300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:848bc800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r5:00001000 r4:eabe9000 r10:61c88647 r9:848bc800 r8:8553f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:638:5132 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:638 state:D stack:0 pid:5132 tgid:5132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:848bd400 r4:848bd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848bd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85540d00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551878c r4:85518400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551878c r4:8553f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848bd400 r8:8553f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553f400 r8:8027ed34 r7:eb6a5e60 r6:85544200 r5:848bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:800d0013 r4:80239bd0 r5:849a538c r4:849a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:848be000 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaee1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542378c r4:85423400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8542378c r4:85544280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848be000 r8:855442ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85544280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544280 r8:8027ed34 r7:eb66de60 r6:85544300 r5:848be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425d20 to 0xe0425d68) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848bec00 r5:848bec00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854a0000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:85540f40 Call trace: 5d60: 800d0013 ffffffff [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:5141 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:854a0c00 r4:854a0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85529000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb051000 r5:8551938c r4:85519000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:641:5143 blocked for more than 466 seconds. r5:854a1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8551978c r4:8553f580 dfa0: 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:854a2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555dd00 r10:61c88647 r9:854a2400 r8:8554462c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:367:5144 is blocked on a mutex likely owned by task kworker/1:102:3666. r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:854a3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855295c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85519f8c r4:85519c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85519f8c r4:8553f600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a3000 r8:8553f62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553f600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553f600 r8:8027ed34 r7:eb6b1e60 r6:8553f680 r5:854a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85529380 INFO: task kworker/1:642:5149 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854a3c00 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854a3c00 r8:8554472c r7:82804d40 r6:dddced40 r5:dddced60 r4:8553b380 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854a4800 r5:854a4800 r4:829187f0 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85529840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb43d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551a78c r4:8551a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551a78c r4:8553f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854a4800 r8:8553f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553f700 r8:8027ed34 r7:eb6c1e60 r6:85544800 r5:854a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85529580 INFO: task kworker/1:643:5152 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0425dc0 r4:84af8400 task:kworker/1:644 state:D stack:0 pid:5153 tgid:5153 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85529740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85529880 INFO: task kworker/1:644:5153 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:645:5156 blocked for more than 466 seconds. r5:854a6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:00001000 r4:eb45d000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:5157 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6d9d84 r8:00000002 r7:60000113 r6:eb6d9d8c r5:854a6c00 r4:854a6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854a6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:82ac11e4 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r5:84a60000 r4:829187f0 r4:00000000 r4:8553f900 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84a60c00 r4:829187f0 r4:00000000 r9:83018205 r8:84a60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb499000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551bb8c r4:8551b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551bb8c r4:8553f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a60c00 r8:8553f9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553f980 r8:8027ed34 r7:eb6d9e60 r6:85544a80 r5:84a60c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85529c80 INFO: task kworker/1:648:5162 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 INFO: task kworker/1:649:5164 blocked for more than 466 seconds. r5:84a63000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a63c00 r4:829187f0 r4:00000000 r4:00000000 r5:8551bf8c r4:8551bc00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:5167 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:5167 tgid:5167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6fdd84 r8:00000002 r7:60000013 r6:eb6fdd8c r5:84a62400 r4:84a62400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a62400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6fde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537440 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551cf8c r4:8551cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551cf8c r4:8553fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a62400 r8:8553fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a66000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8551c38c r4:8553fb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a66000 r8:8553fbac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553fb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553fb80 r8:8027ed34 r7:eb6fde60 r6:85544c80 r5:84a66000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb705fb0 to 0xeb705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85529fc0 INFO: task kworker/1:652:5169 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 810e5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84a65400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0425d20 to 0xe0425d68) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a61800 r5:84a61800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a61800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551cb8c r4:8551c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551cb8c r4:8553fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a61800 r8:8553fcac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553fc80 r8:8027ed34 r7:eb6fde60 r6:85544d80 r5:84a61800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb715fb0 to 0xeb715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85537240 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a66c00 r5:84a66c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08 r5:00001000 r4:dfaa3000 r10:61c88647 r9:84a66c00 r8:8553fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0c00 r5:855e0c00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551d38c r4:8551d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551d38c r4:8553fd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e0c00 r8:8553fdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553fd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553fd80 r8:8027ed34 r7:eb71de60 r6:85544e80 r5:855e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85537380 INFO: task kworker/1:656:5177 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r4:84af1fc0 r5:855e0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r5:00001000 r4:eb509000 r10:61c88647 r9:855e0000 r8:8553fe2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855374c0 Call trace: 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:854e3c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855374c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551db8c r4:8551d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551db8c r4:8553fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:854e1800 r4:829187f0 r9:83018205 r8:854e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 r10:61c88647 r9:854e1800 r8:8553ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8553ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8553ff80 r8:8027ed34 r7:eb71de60 r6:8555e000 r5:854e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85537880 INFO: task kworker/1:659:5184 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:660:5185 blocked for more than 466 seconds. r5:854e0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555c040 r10:61c88647 r9:854e0c00 r8:8555e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85537880 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0425fb0 to 0xe0425ff8) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425d20 to 0xe0425d68) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:5189 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb745d84 r8:00000002 r7:60000113 r6:eb745d8c r5:85568c00 r4:85568c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85568c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb745e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85568c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84744f8c r4:84744c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84744f8c r4:85544f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85568c00 r8:85544fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85544f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85544f80 r8:8027ed34 r7:eb6b5e60 r6:8555e280 r5:85568c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:84af8400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8556b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eb167000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8551f78c r4:8551f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8551f78c r4:8555e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556b000 r8:8555e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8555e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555e300 r8:8027ed34 r7:eb6e1e60 r6:8555e380 r5:8556b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:370:5195 blocked for more than 466 seconds. r5:855e1800 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:855e1800 r8:8556202c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562000 r8:8027ed34 r7:eb6b5e60 r6:85562080 r5:855e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb619fb0 to 0xeb619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8555d7c0 INFO: task kworker/0:370:5195 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:849a538c r4:849a5000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:663:5196 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:663 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:855e3000 r4:855e3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855e3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555c3c0 r4:8555e400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:664:5198 blocked for more than 466 seconds. r5:855e4800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:ddde2d40 r6:83018200 r5:8551fb8c r4:8555e480 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r4:855e5400 r5:855e5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555c800 r4:00000000 r5:8551ff8c r4:8551fc00 Workqueue: events bpf_prog_free_deferred [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:666:5203 blocked for more than 466 seconds. r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552478c r4:85524400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552478c r4:8555e580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6000 r8:8555e5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8555e580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555e580 r8:8027ed34 r7:eb759e60 r6:85562280 r5:855e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 Exception stack(0xe0425fb0 to 0xe0425ff8) r5:855e6c00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561b80 Workqueue: events bpf_prog_free_deferred [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:5207 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:5207 tgid:5207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Workqueue: events bpf_prog_free_deferred r5:84a64800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85565c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a64800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560838c r4:85608000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8560838c r4:85562580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a64800 r8:855625ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb761fb0 to 0xeb761ff8) r4:82ac11e4 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:85570000 r5:85570000 r4:829187f0 r4:00000000 r9:83018205 r8:85570000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r4:8555e700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r5:85572400 r4:829187f0 r4:00000000 r9:83018205 r8:85572400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:00001000 r4:eb36b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552538c r4:85525000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552538c r4:8555e680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85572400 r8:8555e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8555e680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555e680 r8:8027ed34 r7:eb751e60 r6:85562700 r5:85572400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8555cd80 INFO: task kworker/1:669:5215 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8553be80 r4:00000000 r5:00001000 r4:eb3c9000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85573000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:85570c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555d0c0 r7:ddde2d40 r6:83018200 r5:85525b8c r4:8555e880 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:85573c00 r4:829187f0 r4:00000000 r4:00000001 Call trace: r4:00000000 r4:00000001 Call trace: r5:8556bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb769e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85565040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552638c r4:85526000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552638c r4:8555e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556bc00 r8:8555e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8555e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555e980 r8:8027ed34 r7:eb795e60 r6:8555ea00 r5:8556bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb769fb0 to 0xeb769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85565080 INFO: task kworker/1:674:5225 is blocked on a mutex likely owned by task kworker/1:102:3666. Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb79dd84 r8:00000002 r7:60000113 r6:eb79dd8c r5:8556c800 r4:8556c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8556c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85565200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8555ea80 r8:8027ed34 r7:eb795e60 r6:8555eb00 r5:8556c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 r4:85565300 5d60: 800d0013 ffffffff [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8556d400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:e0425dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:677:5231 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:677 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7a5d84 r8:00000002 r7:60000113 r6:eb7a5d8c r5:8556e000 r4:8556e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8556e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85565640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8556e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb64d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552738c r4:85527000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552738c r4:8555ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8556e000 r8:8555ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) r5:800d0013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:5235 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7add84 r8:00000002 r7:60000013 r6:eb7add8c r5:85569800 r4:85569800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85569800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855657c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85569800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7af000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8552778c r4:85527400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8552778c r4:8555ee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85569800 r8:8555eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8555ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555ee80 r8:8027ed34 r7:eb7a9e60 r6:8555ef00 r5:85569800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85565700 INFO: task kworker/1:679:5235 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:5238 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7b9d84 r8:00000002 r7:60000013 r6:eb7b9d8c r5:85380000 r4:85380000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85380000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85565a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85380000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85527f8c r4:85527c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85527f8c r4:8555ef80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85380000 r8:8555efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8555ef80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8555ef80 r8:8027ed34 r7:eb7a9e60 r6:8561e000 r5:85380000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855658c0 INFO: task kworker/1:680:5238 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:5239 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb771d84 r8:00000002 r7:60000013 r6:eb771d8c r5:85580000 r4:85580000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85580000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85580000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae65000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560938c r4:85609000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560938c r4:8561e080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85580000 r8:8561e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e080 r8:8027ed34 r7:eb7b9e60 r6:8561e100 r5:85580000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb771fb0 to 0xeb771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85565cc0 INFO: task kworker/1:681:5239 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:682:5240 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:682 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:85575400 r4:85575400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85575400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555c900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85575400 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560878c r4:85608400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560878c r4:8561e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85575400 r8:8561e1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e180 r8:8027ed34 r7:eb771e60 r6:85562980 r5:85575400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85565cc0 INFO: task kworker/1:682:5240 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:5243 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7c1d84 r8:00000002 r7:60000113 r6:eb7c1d8c r5:85574800 r4:85574800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85574800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85574800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead3b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b6b8c r4:855b6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b6b8c r4:85562a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85574800 r8:85562a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562a00 r8:8027ed34 r7:eb74de60 r6:85562a80 r5:85574800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561b40 INFO: task kworker/0:374:5243 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:5244 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d5d84 r8:00000002 r7:60000113 r6:eb7d5d8c r5:85576c00 r4:85576c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85576c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562ee40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85576c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b4b8c r4:855b4800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b4b8c r4:85562b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576c00 r8:85562b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562b00 r8:8027ed34 r7:eb7c1e60 r6:85562b80 r5:85576c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561b40 INFO: task kworker/0:375:5244 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:5248 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:683 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:85576000 r4:85576000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85576000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85576000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05fd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85608b8c r4:85608800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85608b8c r4:8561e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85576000 r8:8561e22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e200 r8:8027ed34 r7:eb771e60 r6:85562c00 r5:85576000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd100 INFO: task kworker/1:683:5248 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:684:5249 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:684 state:D stack:0 pid:5249 tgid:5249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:84a70000 r4:84a70000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a70000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a70000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85608f8c r4:85608c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85608f8c r4:8561e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70000 r8:8561e2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e280 r8:8027ed34 r7:eb771e60 r6:85562c80 r5:84a70000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd100 INFO: task kworker/1:684:5249 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:685:5252 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:685 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f9d84 r8:00000002 r7:60000113 r6:eb7f9d8c r5:84a72400 r4:84a72400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a72400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd3c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a72400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560978c r4:85609400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560978c r4:8561e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a72400 r8:8561e32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e300 r8:8027ed34 r7:eb771e60 r6:85562d00 r5:84a72400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd540 INFO: task kworker/1:685:5252 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:686:5254 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:686 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb801d84 r8:00000002 r7:60000113 r6:eb801d8c r5:84a71800 r4:84a71800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a71800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4db000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565038c r4:85650000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565038c r4:8561e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a71800 r8:8561e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e380 r8:8027ed34 r7:eb7f9e60 r6:85562d80 r5:84a71800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd480 INFO: task kworker/1:686:5254 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:687:5255 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:687 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb805d84 r8:00000002 r7:60000013 r6:eb805d8c r5:84a70c00 r4:84a70c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a70c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb805e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85609b8c r4:85609800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85609b8c r4:8561e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70c00 r8:8561e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e400 r8:8027ed34 r7:eb801e60 r6:85562e00 r5:84a70c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd480 INFO: task kworker/1:687:5255 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:688:5257 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:688 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb80dd84 r8:00000002 r7:60000113 r6:eb80dd8c r5:84a73000 r4:84a73000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a73000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8561e480 r8:8027ed34 r7:eb801e60 r6:85562e80 r5:84a73000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:5259 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:5259 tgid:5259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb815d84 r8:00000002 r7:60000113 r6:eb815d8c r5:84a73c00 r4:84a73c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a73c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb815e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd840 r7:ddde2d40 r6:83018200 r5:8560a38c r4:8561e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a73c00 r8:8561e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e500 r8:8027ed34 r7:eb801e60 r6:85562f00 r5:84a73c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb815fb0 to 0xeb815ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd600 INFO: task kworker/1:689:5259 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84a76000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a76000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560a78c r4:8560a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560a78c r4:8561e580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76000 r8:8561e5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e580 r8:8027ed34 r7:eb801e60 r6:85562f80 r5:84a76000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb81dfb0 to 0xeb81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dd780 INFO: task kworker/1:690:5261 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:691:5263 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:691 state:D stack:0 pid:5263 tgid:5263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb825d84 r8:00000002 r7:60000113 r6:eb825d8c r5:84a75400 r4:84a75400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a75400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb825e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ddb00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a75400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb445000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ab8c r4:8560a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560ab8c r4:8561e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:8561e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e600 r8:8027ed34 r7:eb801e60 r6:8562f000 r5:84a75400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb825fb0 to 0xeb825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:855dda00 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:692:5265 blocked for more than 466 seconds. r5:85610000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85611800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855ddc80 r10:61c88647 r9:85611800 r8:8561e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dde00 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:694:5269 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:694 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb841d84 r8:00000002 r7:60000013 r6:eb841d8c r5:85610c00 r4:85610c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85610c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb841e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dde80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85610c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb491000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560b78c r4:8560b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560b78c r4:8561e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85610c00 r8:8561e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e780 r8:8027ed34 r7:eb801e60 r6:8562f180 r5:85610c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ddbc0 INFO: task kworker/1:694:5269 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:695:5271 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:695 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb845d84 r8:00000002 r7:60000113 r6:eb845d8c r5:85612400 r4:85612400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85612400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb845e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561f80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85612400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560bb8c r4:8560b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560bb8c r4:8561e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85612400 r8:8561e82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e800 r8:8027ed34 r7:eb801e60 r6:8562f200 r5:85612400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb845fb0 to 0xeb845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ddd80 INFO: task kworker/1:695:5271 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af8400 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:696:5274 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r4:85613c00 r5:85613c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85565f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560bf8c r4:8560bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8560bf8c r4:8561e880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85613c00 r8:8561e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e880 r8:8027ed34 r7:eb801e60 r6:8562f280 r5:85613c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb849fb0 to 0xeb849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ddf00 INFO: task kworker/1:696:5274 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:697:5275 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85614800 r5:85614800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85614800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85650b8c r4:85650800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85650b8c r4:8561e900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85614800 r8:8561e92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e900 r8:8027ed34 r7:eb801e60 r6:8562f300 r5:85614800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb84dfb0 to 0xeb84dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855ddf00 INFO: task kworker/1:697:5275 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:698:5278 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:698 state:D stack:0 pid:5278 tgid:5278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb851d84 r8:00000002 r7:60000013 r6:eb851d8c r5:85615400 r4:85615400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85615400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856331c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85615400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565078c r4:85650400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565078c r4:8561e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85615400 r8:8561e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561e980 r8:8027ed34 r7:eb84de60 r6:8562f380 r5:85615400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633180 INFO: task kworker/1:698:5278 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85616000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eb54b000 r5:85650f8c r4:85650c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:700:5282 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:700 state:D stack:0 pid:5282 tgid:5282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb859d84 r8:00000002 r7:60000113 r6:eb859d8c r5:85616c00 r4:85616c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85616c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856335c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85616c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565138c r4:85651000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565138c r4:8561ea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85616c00 r8:8561eaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ea80 r8:8027ed34 r7:eb855e60 r6:8562f480 r5:85616c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb859fb0 to 0xeb859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633400 INFO: task kworker/1:700:5282 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:701:5283 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:701 state:D stack:0 pid:5283 tgid:5283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb85dd84 r8:00000002 r7:60000013 r6:eb85dd8c r5:85613000 r4:85613000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85613000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856336c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85613000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ed000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8565178c r4:85651400 r10:61c88647 r9:85613000 r8:8561eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:702:5287 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:702 state:D stack:0 pid:5287 tgid:5287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb869d84 r8:00000002 r7:60000013 r6:eb869d8c r5:848a0000 r4:848a0000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856337c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85651b8c r4:85651800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85651b8c r4:8561eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0000 r8:8561ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561eb80 r8:8027ed34 r7:eb85de60 r6:8562f580 r5:848a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:703:5288 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:703 state:D stack:0 pid:5288 tgid:5288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:848a0c00 r4:848a0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633940 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb709000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85651f8c r4:85651c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85651f8c r4:8561ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0c00 r8:8561ec2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ec00 r8:8027ed34 r7:eb869e60 r6:8562f600 r5:848a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633640 INFO: task kworker/1:703:5288 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:704:5291 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:704 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb879d84 r8:00000002 r7:60000113 r6:eb879d8c r5:848a3000 r4:848a3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb879e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb717000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565238c r4:85652000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565238c r4:8561ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a3000 r8:8561ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ec80 r8:8027ed34 r7:eb86de60 r6:8562f680 r5:848a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb879fb0 to 0xeb879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633880 INFO: task kworker/1:704:5291 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:705:5292 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:705 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb87dd84 r8:00000002 r7:60000113 r6:eb87dd8c r5:848a3c00 r4:848a3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633c00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb721000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565278c r4:85652400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565278c r4:8561ed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a3c00 r8:8561ed2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ed00 r8:8027ed34 r7:eb879e60 r6:8562f700 r5:848a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:706:5295 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r5:848a2400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb883000 r5:85652b8c r4:85652800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a2400 r8:8561edac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ed80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ed80 r8:8027ed34 r7:eb87de60 r6:8562f780 r5:848a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633d00 INFO: task kworker/1:706:5295 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5296 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:5296 tgid:5296 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:eb8a1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565338c r4:85653000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565338c r4:8561ee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a1800 r8:8561ee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ee00 r8:8027ed34 r7:eb891e60 r6:8562f800 r5:848a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633e00 INFO: task kworker/1:707:5296 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:708 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb83dd84 r8:00000002 r7:60000013 r6:eb83dd8c r5:85582400 r4:85582400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85582400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85582400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb889000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85652f8c r4:85652c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85652f8c r4:8561ee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85582400 r8:8561eeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ee80 r8:8027ed34 r7:eb895e60 r6:8561ef00 r5:85582400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb83dfb0 to 0xeb83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633f40 INFO: task kworker/1:708:5297 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:5300 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:5300 tgid:5300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:85584800 r4:85584800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85584800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563f140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85584800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565378c r4:85653400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565378c r4:8561ef80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85584800 r8:8561efac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8561ef80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ef80 r8:8027ed34 r7:eb895e60 r6:85641000 r5:85584800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a5fb0 to 0xeb8a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633fc0 INFO: task kworker/1:709:5300 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:5302 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:5302 tgid:5302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:85583000 r4:85583000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85583000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856469c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85583000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b538c r4:855b5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b538c r4:8562f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85583000 r8:8562f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8562f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f880 r8:8027ed34 r7:eb7c1e60 r6:85641080 r5:85583000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562ef00 INFO: task kworker/0:376:5302 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:710:5304 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:710 state:D stack:0 pid:5304 tgid:5304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f1d84 r8:00000002 r7:60000013 r6:eb7f1d8c r5:85585400 r4:85585400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563f300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85585400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85653b8c r4:85653800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85653b8c r4:85641100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85585400 r8:8564112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641100 r8:8027ed34 r7:eb8a5e60 r6:85641180 r5:85585400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563f100 INFO: task kworker/1:710:5304 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5306 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:848a6000 r4:848a6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563f5c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565438c r4:85654000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565438c r4:85641200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a6000 r8:8564122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641200 r8:8027ed34 r7:eb7f1e60 r6:8562f900 r5:848a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563f2c0 INFO: task kworker/1:711:5306 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Exception stack(0xe0425fb0 to 0xe0425ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:712:5308 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:712 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:848a4800 r4:848a4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563f3c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85653f8c r4:85653c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85653f8c r4:85641280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a4800 r8:856412ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641280 r8:8027ed34 r7:eb8c9e60 r6:8562f980 r5:848a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563f400 INFO: task kworker/1:712:5308 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:713:5310 blocked for more than 467 seconds. task:kworker/1:713 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563f840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85654b8c r4:85654800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85654b8c r4:85641300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a6c00 r8:8564132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641300 r8:8027ed34 r7:eb8c9e60 r6:8562fa00 r5:848a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563f500 INFO: task kworker/1:713:5310 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r4:84a74800 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8565478c r4:85654400 r10:61c88647 r9:84a74800 r8:856413ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:5313 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8f5d84 r8:00000002 r7:60000013 r6:eb8f5d8c r5:848a5400 r4:848a5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565678c r4:85656400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565678c r4:85641400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a5400 r8:8564142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641400 r8:8027ed34 r7:eb8e5e60 r6:8562fb00 r5:848a5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563f640 INFO: task kworker/1:715:5313 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:5315 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:5315 tgid:5315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:855f8c00 r4:855f8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855f8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85654f8c r4:85654c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85654f8c r4:85641500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f8c00 r8:8564152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641500 r8:8027ed34 r7:eb8f5e60 r6:8562fb80 r5:855f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563f780 INFO: task kworker/1:716:5315 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:717:5317 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:717 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb905d84 r8:00000002 r7:60000113 r6:eb905d8c r5:855f8000 r4:855f8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855f8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563fa00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0731000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565538c r4:85655000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565538c r4:85641480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855f8000 r8:856414ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641480 r8:8027ed34 r7:eb8f5e60 r6:8562fc00 r5:855f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563fbc0 INFO: task kworker/1:717:5317 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 816c4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:718:5319 blocked for more than 467 seconds. r5:855fb000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:8565578c r4:85655400 r10:61c88647 r9:855fb000 r8:856415ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:719 state:D stack:0 pid:5321 tgid:5321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb915d84 r8:00000002 r7:60000113 r6:eb915d8c r5:855fa400 r4:855fa400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855fa400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563fd40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85655b8c r4:85655800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85655b8c r4:85641600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fa400 r8:8564162c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641600 r8:8027ed34 r7:eb8f5e60 r6:8562fd00 r5:855fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563fb80 INFO: task kworker/1:719:5321 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85655f8c r4:85641680 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:5325 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb925d84 r8:00000002 r7:60000013 r6:eb925d8c r5:855fbc00 r4:855fbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855fbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563ff80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb177000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565638c r4:85656000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565638c r4:85641780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fbc00 r8:856417ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641780 r8:8027ed34 r7:eb8f5e60 r6:8562fe00 r5:855fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb925fb0 to 0xeb925ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562e3c0 INFO: task kworker/1:721:5325 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565738c r4:85657000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565738c r4:85641700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fc800 r8:8564172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641700 r8:8027ed34 r7:eb8f5e60 r6:8562fe80 r5:855fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb92dfb0 to 0xeb92dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568f000 INFO: task kworker/1:722:5327 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 836ee000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 r4:82ac11e4 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f180 r5:85656b8c r4:85656800 r4:85641800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568f300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85586c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2df000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85656f8c r4:85656c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85656f8c r4:85641900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586c00 r8:8564192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641900 r8:8027ed34 r7:eb92de60 r6:85641980 r5:85586c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb931fb0 to 0xeb931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568f440 INFO: task kworker/1:724:5332 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r5:00001000 r4:eb32f000 r10:61c88647 r9:85583c00 r8:85641a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:85641a00 r8:8027ed34 r7:eb92de60 r6:85641a80 r5:85583c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568f3c0 INFO: task kworker/1:725:5334 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 83b3e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85657f8c r4:85657c00 r10:00000000 r9:85641b00 r8:8027ed34 r7:eb935e60 r6:85641b80 r5:85581800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb8bdd84 r8:00000002 r7:60000113 r6:eb8bdd8c r5:85580c00 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85641c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641c80 r8:8027ed34 r7:eb939e60 r6:85641d00 r5:85580c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568f3c0 INFO: task kworker/1:727:5337 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 841aa000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8568fa80 r10:61c88647 r9:8556a400 r8:85641c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 84673000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb733000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565878c r4:85658400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565878c r4:85641e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85578000 r8:85641e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641e00 r8:8027ed34 r7:eb941e60 r6:85641e80 r5:85578000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568f9c0 INFO: task kworker/1:729:5342 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 84790000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849a538c r4:849a5000 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r4:85579800 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:855b578c r4:855b5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b578c r4:85641f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85579800 r8:85641f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85641f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85641f00 r8:8027ed34 r7:eb949e60 r6:85641f80 r5:85579800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568fb40 INFO: task kworker/1:730:5344 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 84bca000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:377:5346 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r4:855fec00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:855b678c r4:8562ff00 r4:8562ff00 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: 84bca000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:5349 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb945d84 r8:00000002 r7:60000013 r6:eb945d8c r5:855fd400 r4:855fd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:855fd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cf040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:855fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb741000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85658b8c r4:85658800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85658b8c r4:8569f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855fd400 r8:8569f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f000 r8:8027ed34 r7:eb949e60 r6:856a3000 r5:855fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8568fe40 INFO: task kworker/1:731:5349 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a76c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569d040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a76c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85658f8c r4:85658c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85658f8c r4:8569f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76c00 r8:8569f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeb95dfb0 to 0xeb95dff8) Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dffd1000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb96dd84 r8:00000002 r7:60000113 r6:eb96dd8c r5:84a08000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569d700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a08000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565a38c r4:8565a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565a38c r4:8569f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08000 r8:8569f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f180 r8:8027ed34 r7:eb965e60 r6:856a3180 r5:84a08000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8569d140 INFO: task kworker/1:734:5355 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 860ca000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dffd1000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:85578c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85578c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 r10:61c88647 r9:85578c00 r8:8569f22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569d140 r4:00000000 r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:736:5359 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:736 state:D stack:0 pid:5359 tgid:5359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb969d84 r8:00000002 r7:60000013 r6:eb969d8c r5:8557b000 r4:8557b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8557b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569d440 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8557b000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b3000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb969fb0 to 0xeb969ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8557bc00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:dfac1000 r10:61c88647 r9:8557bc00 r8:8569f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:738 state:D stack:0 pid:5363 tgid:5363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7e5d84 r8:00000002 r7:60000113 r6:eb7e5d8c r5:8557d400 r4:8557d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8557d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569d940 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8557d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaaf5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565a78c r4:8565a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565a78c r4:8569f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557d400 r8:8569f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f500 r8:8027ed34 r7:eb96de60 r6:8569f580 r5:8557d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e5fb0 to 0xeb7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8569d7c0 INFO: task kworker/1:738:5363 is blocked on a mutex likely owned by task kworker/1:102:3666. r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8569d900 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:82ac11e4 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8557ec00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569da00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8557ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565ab8c r4:8565a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565ab8c r4:8569f700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8557ec00 r8:8569f72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f700 r8:8027ed34 r7:eb7cde60 r6:8569f780 r5:8557ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8569dbc0 INFO: task kworker/1:740:5366 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 86e61000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:849a538c r4:849a5000 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb09b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:742:5371 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:742 state:D stack:0 pid:5371 tgid:5371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:85590000 r4:85590000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85590000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569da40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85590000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565b38c r4:8565b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565b38c r4:8569f900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590000 r8:8569f92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569f900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569f900 r8:8027ed34 r7:eb7cde60 r6:8569f980 r5:85590000 Exception stack(0xeb975fb0 to 0xeb975ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85591800 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5375 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb97dd84 r8:00000002 r7:60000013 r6:eb97dd8c r5:85593000 r4:85593000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85593000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85593000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8565bf8c r4:8565bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8565bf8c r4:8569fb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85593000 r8:8569fb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569fb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569fb00 r8:8027ed34 r7:eb979e60 r6:8569fb80 r5:85593000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb97dfb0 to 0xeb97dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ad100 INFO: task kworker/1:744:5375 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 87a73000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:745 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85592400 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85592400 r8:8569fc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85593c00 r4:829187f0 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ad5c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85593c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566478c r4:85664400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566478c r4:8569fd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85593c00 r8:8569fd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8569fd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8569fd00 r8:8027ed34 r7:eb981e60 r6:8569fd80 r5:85593c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d5fb0 to 0xeb8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ad500 INFO: task kworker/1:746:5379 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 88377000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85594800 r5:85594800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8569fe00 r8:8027ed34 r7:eb8d5e60 r6:8569fe80 r5:85594800 INFO: task kworker/1:747:5381 is blocked on a mutex likely owned by task kworker/1:102:3666. 5d60: 800d0013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:748:5382 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:5382 tgid:5382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:85596000 r4:85596000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85596000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:85590c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566578c r4:85665400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8566578c r4:856b8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85590c00 r8:856b802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b8000 r8:8027ed34 r7:eb98de60 r6:856b8080 r5:85590c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ada00 INFO: task kworker/1:749:5385 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 88b81000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85596c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8557a400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8566538c r4:856b8280 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:752:5391 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5391 tgid:5391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:85588c00 r4:85588c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85588c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b3100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85588c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85665b8c r4:85665800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85665b8c r4:856b8300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85588c00 r8:856b832c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b8300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b8300 r8:8027ed34 r7:eb991e60 r6:856b8380 r5:85588c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb989fb0 to 0xeb989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b3000 INFO: task kworker/1:752:5391 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85589800 r5:85589800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:754:5395 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:8558a400 r4:8558a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8558a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b3240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8558a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85665f8c r4:85665c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85665f8c r4:856b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8558a400 r8:856b852c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b8500 r8:8027ed34 r7:eb9a1e60 r6:856b8580 r5:8558a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:754:5395 is blocked on a mutex likely owned by task kworker/1:102:3666. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8558b000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8566678c r4:85666400 r10:00000000 r9:856b8600 r8:8027ed34 r7:eb9a1e60 r6:856b8680 r5:8558b000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8558bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856b3440 INFO: task kworker/1:756:5399 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 89dd6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:757:5401 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:757 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8558c800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856b8800 r8:8027ed34 r7:eb9ade60 r6:856b8880 r5:8558c800 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8558d400 r5:8558d400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8a224000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:759:5405 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:759 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eb99dd84 r8:00000002 r7:60000013 r6:eb99dd8c r5:8558ec00 r5:8558ec00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:856b8b00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8a7b3000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:761:5409 blocked for more than 468 seconds. [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8558e000 r4:829187f0 r4:00000000 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85595400 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85595400 r8:856b8d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:763:5413 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:763 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:85598000 r4:85598000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85598000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85598000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85674b8c r4:85674800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85674b8c r4:856b8e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85598000 r8:856b8e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856b8e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856b8e00 r8:8027ed34 r7:eb9c1e60 r6:856b8e80 r5:85598000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c5fb0 to 0xeb9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r5:800d0013 r4:80239bd0 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:85598c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:856c9100 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9880 r10:61c88647 r9:85599800 r8:856cb02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c9200 INFO: task kworker/1:765:5418 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8b604000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:766:5419 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8559a400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:767:5421 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:767 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9d1d84 r8:00000002 r7:60000013 r6:eb9d1d8c r5:8559b000 r4:8559b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856c9500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8559b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567538c r4:85675000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567538c r4:856cb200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559b000 r8:856cb22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856cb200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb200 r8:8027ed34 r7:eb9cde60 r6:856cb280 r5:8559b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9d1fb0 to 0xeb9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856c9440 INFO: task kworker/1:767:5421 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8559bc00 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8559bc00 r8:856cb32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb9e1d84 r8:00000002 r7:60000113 r6:eb9e1d8c r5:8559d400 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8bd91000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:770:5427 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:770 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:8559ec00 r4:8559ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8559ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Workqueue: events bpf_prog_free_deferred r5:84a0ec00 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856cb600 r8:8027ed34 r7:eb9ede60 r6:856a3200 r5:84a0ec00 Call trace: 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5432 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5432 tgid:5432 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba0dd84 r8:00000002 r7:60000013 r6:eba0dd8c r5:84a0d400 r4:84a0d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a0d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856cb680 r8:8027ed34 r7:eba01e60 r6:856a3280 r5:84a0d400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8559e000 r5:8559e000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85677b8c r4:856cb700 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8559c800 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8569de00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8559c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba09000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85676f8c r4:85676c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85676f8c r4:856cb800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8559c800 r8:856cb82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856cb800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cb800 r8:8027ed34 r7:eb9e5e60 r6:856cb880 r5:8559c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9ddfb0 to 0xeb9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847960c0 INFO: task kworker/1:774:5435 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8c6b3000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85700000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d8040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85700000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:00001000 r4:dffd1000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85700c00 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85700c00 r8:856cba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:776:5439 is blocked on a mutex likely owned by task kworker/1:102:3666. r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:777:5442 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:777 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba2dd84 r8:00000002 r7:60000113 r6:eba2dd8c r5:85701800 r4:85701800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85701800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d8480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85701800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba35000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85677f8c r4:85677c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85677f8c r4:856cbb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85701800 r8:856cbb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856cbb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cbb00 r8:8027ed34 r7:eb9e5e60 r6:856cbb80 r5:85701800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba2dfb0 to 0xeba2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d8340 INFO: task kworker/1:777:5442 is blocked on a mutex likely owned by task kworker/1:102:3666. Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r5:00001000 r4:dffd1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eba39d84 r8:00000002 r7:60000013 r6:eba39d8c r5:85702400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:856cbc00 9fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:779:5446 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:779 state:D stack:0 pid:5446 tgid:5446 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba41d84 r8:00000002 r7:60000113 r6:eba41d8c r5:85703000 r4:85703000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85703000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d8680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85703000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba43000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85703c00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85704800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8d92a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:782:5452 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:782 state:D stack:0 pid:5452 tgid:5452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba61d84 r8:00000002 r7:60000013 r6:eba61d8c r5:85705400 r4:85705400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85705400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d8b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85705400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba5d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567cf8c r4:8567cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567cf8c r4:856eb000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85706c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xeba19fb0 to 0xeba19ff8) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 r5:85709800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a0c800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeba69fb0 to 0xeba69ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8e360000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:84a0b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8140 r7:dddced40 r6:83018000 r5:855b738c r4:856a3400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:785:5462 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:785 state:D stack:0 pid:5462 tgid:5462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:84a09800 r4:84a09800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a09800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e22c0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:856eb300 r8:8027ed34 r7:eba7de60 r6:856a3500 r5:84a09800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8e856000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a0a400 r5:84a0a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:8567e38c r4:8567e000 r10:00000000 r9:856eb380 r8:8027ed34 r7:eba7de60 r6:856a3580 r5:84a0a400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a0e000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8567e78c r4:856eb400 r10:61c88647 r9:84a0e000 r8:856eb42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856eb400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eb400 r8:8027ed34 r7:eba89e60 r6:856a3600 r5:84a0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e2580 INFO: task kworker/1:787:5467 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 8ecd4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:84af1fc0 r10:829187f4 r9:eba91d84 r8:00000002 r7:600f0013 r6:eba91d8c r5:84a0bc00 r5:84a0bc00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8567f38c r4:856eb480 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:790:5472 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:790 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba99d84 r8:00000002 r7:60000113 r6:eba99d8c r5:84480000 r4:84480000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84480000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e2940 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84480000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3db000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567ef8c r4:8567ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8567ef8c r4:856eb580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84480000 r8:856eb5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856eb580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eb580 r8:8027ed34 r7:eba91e60 r6:856a3780 r5:84480000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Not tainted 6.15.0-syzkaller #0 r5:8570b000 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:791:5475 is blocked on a mutex likely owned by task kworker/1:102:3666. r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 r5:8570bc00 r4:829187f0 r4:00000000 r5:8567f78c r4:8567f400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 Exception stack(0xe0425fb0 to 0xe0425ff8) [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8567fb8c r4:856eb800 5d60: 800d0013 ffffffff r5:849a538c r4:849a5000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8570d400 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8200 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaadfb0 to 0xebaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e8100 INFO: task kworker/0:380:5482 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 900cf000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:794:5483 blocked for more than 469 seconds. r5:8570e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85774b8c r4:856eb980 Exception stack(0xebab1fb0 to 0xebab1ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:795:5485 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:795 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebaa9d84 r8:00000002 r7:60000013 r6:ebaa9d8c r5:8570a400 r4:8570a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e12c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8570a400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577438c r4:85774000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577438c r4:856eba80 r4:00000001 r4:856e1200 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:5488 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85708000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85706000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85706000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e8f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85706000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb6f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b7b8c r4:855b7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b7b8c r4:856a3900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85706000 r8:856a392c r7:82804d40 r6:dddced40 r5:dddced60 r4:856a3900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a3900 r8:8027ed34 r7:ebabde60 r6:856ebc00 r5:85706000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 r4:85710000 r5:85710000 r4:829187f0 r4:00000000 r9:83018205 r8:85710000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r4:856ebc80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5492 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebac9d84 r8:00000002 r7:60000113 r6:ebac9d8c r5:85710c00 r4:85710c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85710c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e1ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85710c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r7:ddde2d40 r6:83018200 r5:85774f8c r4:856ebd80 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e1c00 r7:ddde2d40 r6:83018200 r5:8577538c r4:856ebe80 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e1b80 INFO: task kworker/1:798:5496 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9146d000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85712400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856e1b00 INFO: task kworker/1:799:5498 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 91bba000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85713000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e1f40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85713000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85775b8c r4:85775800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85775b8c r4:856ee080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:856ee080 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:801:5501 blocked for more than 469 seconds. r5:85713c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:85713c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r10:61c88647 r9:85713c00 r8:856ee1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:801:5501 is blocked on a mutex likely owned by task kworker/1:102:3666. 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85714800 r4:829187f0 r4:00000000 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85714800 r8:856ee2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ee280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee280 r8:8027ed34 r7:ebad9e60 r6:856ee300 r5:85714800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae1fb0 to 0xebae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ec280 INFO: task kworker/1:802:5504 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 91bba000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85715400 r5:85715400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:85715400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 r10:61c88647 r9:85715400 r8:856ee3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ec100 Call trace: r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5508 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb01d84 r8:00000002 r7:60000113 r6:ebb01d8c r5:85716000 r4:85716000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85716000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85716000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebafd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776b8c r4:85776800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85776b8c r4:856ee480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ec300 INFO: task kworker/1:804:5508 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 92881000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85716c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8577738c r4:85777000 r10:00000000 r9:856ee580 r8:8027ed34 r7:ebb01e60 r6:856ee600 r5:85716c00 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5511 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5511 tgid:5511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb09d84 r8:00000002 r7:60000113 r6:ebb09d8c r5:8570ec00 r4:8570ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8570ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8570ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776f8c r4:85776c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85776f8c r4:856ee680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8570ec00 r8:856ee6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ee680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ee680 r8:8027ed34 r7:ebaede60 r6:856ee700 r5:8570ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb09fb0 to 0xebb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ec8c0 INFO: task kworker/1:806:5511 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 800d0013 ffffffff r4:00000000 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84af1fc0 task:kworker/1:807 state:D stack:0 pid:5514 tgid:5514 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85708c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ec900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85708c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577778c r4:85777400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8577778c r4:856ee780 r4:856ee780 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85718000 r5:85718000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5517 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb15d84 r8:00000002 r7:60000113 r6:ebb15d8c r5:85718c00 r4:85718c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85718c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856ecc80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85718c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:810:5519 blocked for more than 469 seconds. r5:85719800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578038c r4:85780000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578038c r4:856eea80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85719800 r8:856eeaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856eea80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eea80 r8:8027ed34 r7:ebb15e60 r6:856eeb00 r5:85719800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856ecd00 INFO: task kworker/1:810:5519 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9332b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 r4:8571a400 r5:8571a400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebb3dfb0 to 0xebb3dff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:ebb45d84 r8:00000002 r7:60000113 r6:ebb45d8c r5:8571b000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:856ecd00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 93ada000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5525 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb59d84 r8:00000002 r7:60000013 r6:ebb59d8c r5:8571c800 r4:8571c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8571d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857af440 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8571d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb61000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578138c r4:85781000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578138c r4:856eee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8571d400 r8:856eeeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856eee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856eee80 r8:8027ed34 r7:ebb59e60 r6:856eef00 r5:8571d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb65fb0 to 0xebb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857af280 INFO: task kworker/1:814:5527 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 94067000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:815:5529 blocked for more than 469 seconds. r5:8571bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85781b8c r4:856eef80 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:383:5531 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:383 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb81d84 r8:00000002 r7:60000113 r6:ebb81d8c r5:8571e000 r4:8571e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8571e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:855b7f8c r4:856a3980 1fa0: 00000000 00000000 00000000 00000000 Call trace: 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84af1fc0 task:kworker/1:816 state:D stack:0 pid:5532 tgid:5532 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85720000 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:85720c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb9b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578238c r4:85782000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578238c r4:857b4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85720c00 r8:857b422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857b4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b4200 r8:8027ed34 r7:ebb6de60 r6:857b4280 r5:85720c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb79fb0 to 0xebb79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857af640 INFO: task kworker/1:817:5536 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 94e5e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85721800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85781f8c r4:85781c00 r10:00000000 r9:857b4300 r8:8027ed34 r7:ebb79e60 r6:857b4380 r5:85721800 r4:857afa80 INFO: task kworker/1:818:5537 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 94e5e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85723000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e2e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85723000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbaf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578278c r4:85782400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578278c r4:857b4400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85723000 r8:857b442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857b4400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:5541 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbadd84 r8:00000002 r7:60000113 r6:ebbadd8c r5:85722400 r4:85722400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85722400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ebc15000 r10:61c88647 r9:85722400 r8:856a3a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856e8700 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:820:5543 blocked for more than 469 seconds. r5:85724800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ebbb5000 r10:61c88647 r9:85724800 r8:857b45ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5545 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5545 tgid:5545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb99d84 r8:00000002 r7:60000113 r6:ebb99d8c r5:85725400 r4:85725400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85725400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:85725400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 r10:61c88647 r9:85725400 r8:857b46ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857b6280 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 task:kworker/1:822 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:857b4780 r8:8027ed34 r7:ebb99e60 r6:857b4800 r5:85726000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc9fb0 to 0xebbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b6100 INFO: task kworker/1:822:5548 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 95e4a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85726c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8578378c r4:857b4880 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 r4:84af8400 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85723c00 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xebbd1fb0 to 0xebbd1ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 960d3000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5553 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5553 tgid:5553 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbe5d84 r8:00000002 r7:60000013 r6:ebbe5d8c r5:85728000 r4:85728000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85728000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6580 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85728000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85783b8c r4:85783800 r10:61c88647 r9:85728000 r8:857b4aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857b65c0 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5556 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5556 tgid:5556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:ebbddd84 r8:00000002 r7:60000013 r6:ebbddd8c r5:85729800 r5:85729800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:857b66c0 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:8572a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ebc09d84 r8:00000002 r7:60000013 r6:ebc09d8c r5:8572bc00 r5:8572bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b6dc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8572bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0f1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc05000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85790b8c r4:85790800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85790b8c r4:857b4d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572bc00 r8:857b4dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857b4d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b4d80 r8:8027ed34 r7:ebc01e60 r6:857b4e00 r5:8572bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b6d40 INFO: task kworker/1:828:5558 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9716e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:8572b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 9716e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/1:830:5563 blocked for more than 469 seconds. r5:85728c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc25e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85790f8c r4:85790c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85790f8c r4:857b4f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85728c00 r8:857b4fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857b4f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b4f80 r8:8027ed34 r7:ebc19e60 r6:857c6000 r5:85728c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857b6980 INFO: task kworker/1:830:5563 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 979ee000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:8572c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5567 tgid:5567 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc3dd84 r8:00000002 r7:60000113 r6:ebc3dd8c r5:8572ec00 r4:8572ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8572ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc3de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8572ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfadd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579178c r4:85791400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579178c r4:857c6100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8572ec00 r8:857c612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c6100 r8:8027ed34 r7:ebc19e60 r6:857c6180 r5:8572ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc3dfb0 to 0xebc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857bc1c0 INFO: task kworker/1:831:5567 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 979ee000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ebc55d84 r8:00000002 r7:60000113 r6:ebc55d8c r5:8572d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc55e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:857c6200 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:5573 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:5573 tgid:5573 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbf1d84 r8:00000002 r7:60000113 r6:ebbf1d8c r5:84480c00 r4:84480c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84480c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e3d40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84480c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r5:85820b8c r4:85820800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84483c00 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bea40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84483c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474538c r4:84745000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474538c r4:856a3c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483c00 r8:856a3c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:856a3c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856a3c00 r8:8027ed34 r7:ebbf1e60 r6:856a3c80 r5:84483c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc39fb0 to 0xebc39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857be640 INFO: task kworker/0:387:5574 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d60: 800d0013 ffffffff r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84af1fc0 task:kworker/1:833 state:D stack:0 pid:5575 tgid:5575 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84484800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:857c6300 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84485400 r4:829187f0 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:857c6380 r8:8027ed34 r7:ebc59e60 r6:856a3d80 r5:84485400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc5dfb0 to 0xebc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857bc780 INFO: task kworker/1:834:5577 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 99018000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:388 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84486000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:388:5579 is blocked on a mutex likely owned by task kworker/1:102:3666. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r5:849a538c r4:849a5000 r4:00000001 INFO: task kworker/1:835:5581 blocked for more than 470 seconds. r5:84486c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5584 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5584 tgid:5584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc75d84 r8:00000002 r7:60000013 r6:ebc75d8c r5:84482400 r4:84482400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84482400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:84482400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r10:61c88647 r9:84482400 r8:857c64ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:836:5584 is blocked on a mutex likely owned by task kworker/1:102:3666. 5d60: 800d0013 ffffffff r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:85730000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc900 r10:61c88647 r9:85730000 r8:857c652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857bcd80 INFO: task kworker/1:837:5586 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 99888000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5587 blocked for more than 470 seconds. r10:829187f4 r9:ebc6dd84 r8:00000002 r7:60000113 r6:ebc6dd8c r5:85730c00 r5:85730c00 r4:829187f0 r4:00000000 r9:83018205 r8:85730c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r10:61c88647 r9:85730c00 r8:857c662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:84483000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:85793b8c r4:857c6700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483000 r8:857c672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c6700 r8:8027ed34 r7:ebc61e60 r6:857c7000 r5:84483000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856d8d00 INFO: task kworker/1:839:5590 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9a0d1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af1fc0 r5:8571ec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc89e08 r5:00001000 r4:eb707000 r10:61c88647 r9:8571ec00 r8:857c67ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:840:5591 is blocked on a mutex likely owned by task kworker/1:102:3666. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:841:5593 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:841 state:D stack:0 pid:5593 tgid:5593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc9dd84 r8:00000002 r7:60000113 r6:ebc9dd8c r5:84818c00 r4:84818c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84818c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc9de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bf2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84818c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85793f8c r4:85793c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85793f8c r4:857c6800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818c00 r8:857c682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c6800 r8:8027ed34 r7:ebc85e60 r6:857c7100 r5:84818c00 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84818000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb7f5000 r10:61c88647 r9:84818000 r8:857c68ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:843 state:D stack:0 pid:5597 tgid:5597 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579878c r4:857c6900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85731800 r8:857c692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c6900 r8:8027ed34 r7:ebca5e60 r6:857c6980 r5:85731800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857bf240 INFO: task kworker/1:843:5597 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9a782000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:844:5600 blocked for more than 470 seconds. r10:829187f4 r9:ebca9d84 r8:00000002 r7:60000113 r6:ebca9d8c r5:85732400 r5:85732400 r4:829187f0 r4:00000000 r9:83018205 r8:85732400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5601 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5601 tgid:5601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc7dd84 r8:00000002 r7:60000013 r6:ebc7dd8c r5:85733000 r4:85733000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85733000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc7de08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bfa00 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:85733c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb1e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 Exception stack(0xe0425fb0 to 0xe0425ff8) r4:85734800 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bfc00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85734800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85799b8c r4:85799800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85799b8c r4:857c6d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85734800 r8:857c6dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c6d80 r8:8027ed34 r7:ebc7de60 r6:857c6e00 r5:85734800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb9fb0 to 0xebcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: 9b124000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r5:849a538c r4:849a5000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85735400 r5:85735400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85735400 r8:857c6d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c6d00 r8:8027ed34 r7:ebcb9e60 r6:857c6e80 r5:85735400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcbdfb0 to 0xebcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857bfc00 INFO: task kworker/1:848:5608 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9b716000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:849a538c r4:849a5000 Not tainted 6.15.0-syzkaller #0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:849a538c r4:849a5000 INFO: task kworker/1:850:5612 blocked for more than 470 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bef00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85736c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579a38c r4:8579a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579a38c r4:857d9080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85736c00 r8:857d90ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9080 r8:8027ed34 r7:ebcc1e60 r6:857d9100 r5:85736c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc5fb0 to 0xebcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/1:851 state:D stack:0 pid:5613 tgid:5613 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8572e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc680 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 INFO: task kworker/1:852:5616 blocked for more than 470 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857bc180 INFO: task kworker/1:852:5616 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9bd28000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:00000000 r4:84af8400 Not tainted 6.15.0-syzkaller #0 r5:8481a400 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:00000001 task:kworker/1:854 state:D stack:0 pid:5619 tgid:5619 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcd9d84 r8:00000002 r7:60000113 r6:ebcd9d8c r5:8481bc00 r4:8481bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:857df100 5d60: 800d0013 ffffffff r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5622 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5622 tgid:5622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcddd84 r8:00000002 r7:60000113 r6:ebcddd8c r5:8481c800 r4:8481c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df740 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579bf8c r4:8579bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579bf8c r4:857d9480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481c800 r8:857d94ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9480 r8:8027ed34 r7:ebccde60 r6:857c7300 r5:8481c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857df280 INFO: task kworker/1:855:5622 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9c521000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1fc0 INFO: task kworker/1:856:5623 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred r4:8481d400 r5:8481d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce1e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8579b78c r4:857d9500 r4:857d9500 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857df280 INFO: task kworker/1:856:5623 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9c82a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5627 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5627 tgid:5627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba71d84 r8:00000002 r7:60000013 r6:eba71d8c r5:8481ec00 r4:8481ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579bb8c r4:8579b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579bb8c r4:857d9580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481ec00 r8:857d95ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9580 r8:8027ed34 r7:ebcdde60 r6:857c7400 r5:8481ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857df5c0 INFO: task kworker/1:857:5627 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9c82a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:858:5629 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:858 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb41d84 r8:00000002 r7:60000113 r6:ebb41d8c r5:8481b000 r4:8481b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dfc00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a4b8c r4:857a4800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a4b8c r4:857d9600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481b000 r8:857d962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:858:5629 is blocked on a mutex likely owned by task kworker/1:102:3666. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9ca15000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5631 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5631 tgid:5631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebce5d84 r8:00000002 r7:60000013 r6:ebce5d8c r5:84819800 r4:84819800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84819800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84819800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a438c r4:857a4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a438c r4:857d9680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84819800 r8:857d96ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9680 r8:8027ed34 r7:ebb41e60 r6:857c7500 r5:84819800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857df5c0 INFO: task kworker/1:859:5631 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9cf9a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:860:5633 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:860 state:D stack:0 pid:5633 tgid:5633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:8481e000 r4:8481e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dfd00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8481e000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb355000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a4f8c r4:857d9700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481e000 r8:857d972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9700 r8:8027ed34 r7:ebb41e60 r6:857c7580 r5:8481e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd5fb0 to 0xebcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857df7c0 INFO: task kworker/1:860:5633 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9d386000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:389:5635 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:389 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebce9d84 r8:00000002 r7:60000113 r6:ebce9d8c r5:84481800 r4:84481800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84481800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e3c80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84481800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb0f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85820f8c r4:85820c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85820f8c r4:857c7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84481800 r8:857c762c r7:82804d40 r6:dddced40 r5:dddced60 r4:857c7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7600 r8:8027ed34 r7:ebbf1e60 r6:857c7680 r5:84481800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce9fb0 to 0xebce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857cb880 INFO: task kworker/0:389:5635 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9d386000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:861:5637 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:861 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcedd84 r8:00000002 r7:60000013 r6:ebcedd8c r5:85748000 r4:85748000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85748000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85748000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb787000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a5f8c r4:857a5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a5f8c r4:857d9780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748000 r8:857d97ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9780 r8:8027ed34 r7:ebcd5e60 r6:857c7700 r5:85748000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dfc80 INFO: task kworker/1:861:5637 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9d9cf000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:862:5638 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:862 state:D stack:0 pid:5638 tgid:5638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcf1d84 r8:00000002 r7:60000113 r6:ebcf1d8c r5:85748c00 r4:85748c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85748c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dfe80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85748c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3c1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a538c r4:857a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a538c r4:857d9800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748c00 r8:857d982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9800 r8:8027ed34 r7:ebcede60 r6:857c7780 r5:85748c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dfc80 INFO: task kworker/1:862:5638 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9d9cf000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:863:5640 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:863 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:85749800 r4:85749800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85749800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dff40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85749800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a578c r4:857a5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a578c r4:857d9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85749800 r8:857d98ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9880 r8:8027ed34 r7:ebcede60 r6:857c7800 r5:85749800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf5fb0 to 0xebcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dfdc0 INFO: task kworker/1:863:5640 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9d9cf000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:864:5642 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:864 state:D stack:0 pid:5642 tgid:5642 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:8574a400 r4:8574a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bc300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574a400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb735000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a5b8c r4:857a5800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a5b8c r4:857d9900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574a400 r8:857d992c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9900 r8:8027ed34 r7:ebcede60 r6:857c7880 r5:8574a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec505fb0 to 0xec505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857df400 INFO: task kworker/1:864:5642 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9d9cf000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:865:5644 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:865 state:D stack:0 pid:5644 tgid:5644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec50dd84 r8:00000002 r7:60000013 r6:ec50dd8c r5:8574bc00 r4:8574bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec50de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb93d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a738c r4:857a7000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a738c r4:857d9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574bc00 r8:857d99ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9980 r8:8027ed34 r7:ebcede60 r6:857c7900 r5:8574bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec50dfb0 to 0xec50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dc080 INFO: task kworker/1:865:5644 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9e2c6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:866:5647 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:866 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec511d84 r8:00000002 r7:60000013 r6:ec511d8c r5:8574c800 r4:8574c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a638c r4:857a6000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a638c r4:857d9a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574c800 r8:857d9a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9a00 r8:8027ed34 r7:ec50de60 r6:857c7980 r5:8574c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec511fb0 to 0xec511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dc080 INFO: task kworker/1:866:5647 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9e2c6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:867:5648 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:867 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec515d84 r8:00000002 r7:60000113 r6:ec515d8c r5:8574d400 r4:8574d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec515e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a678c r4:857a6400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a678c r4:857d9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574d400 r8:857d9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9a80 r8:8027ed34 r7:ec50de60 r6:857c7a00 r5:8574d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec515fb0 to 0xec515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dc280 INFO: task kworker/1:867:5648 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9e2c6000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:868:5650 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:868 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:8574e000 r4:8574e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574e000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a6b8c r4:857a6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a6b8c r4:857d9b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574e000 r8:857d9b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9b00 r8:8027ed34 r7:ec50de60 r6:857c7a80 r5:8574e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec519fb0 to 0xec519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dc4c0 INFO: task kworker/1:868:5650 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9eb64000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:869:5652 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:869 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec51dd84 r8:00000002 r7:60000013 r6:ec51dd8c r5:8574ec00 r4:8574ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb921000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a6f8c r4:857a6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a6f8c r4:857d9b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574ec00 r8:857d9bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9b80 r8:8027ed34 r7:ec50de60 r6:857c7b00 r5:8574ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec51dfb0 to 0xec51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857dc340 INFO: task kworker/1:869:5652 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: 9eb64000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:870:5655 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:870 state:D stack:0 pid:5655 tgid:5655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec529d84 r8:00000002 r7:60000113 r6:ec529d8c r5:84ab8c00 r4:84ab8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec529e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dc7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ab8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a778c r4:857a7400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a778c r4:857d9c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ab8c00 r8:857d9c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857d9c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857d9c00 r8:8027ed34 r7:ec50de60 r6:857c7b80 r5:84ab8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec529fb0 to 0xec529ff8) 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec531d84 r8:00000002 r7:60000113 r6:ec531d8c r5:84aba400 r4:84aba400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aba400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec531e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dcc00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aba400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r5:00001000 r4:dffd1000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84ab8000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xec535fb0 to 0xec535ff8) Exception stack(0xe0425d20 to 0xe0425d68) [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 Exception stack(0xec53dfb0 to 0xec53dff8) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:829187f4 r9:ec545d84 r8:00000002 r7:60000113 r6:ec545d8c r5:84abb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred r5:00001000 r4:dffd1000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:84af8400 INFO: task kworker/1:876:5666 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcc9d84 r8:00000002 r7:60000013 r6:ebcc9d8c r5:857e8000 r4:857e8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857dce00 r7:ddde2d40 r6:83018200 r5:8589cb8c r4:857d9f00 Call trace: r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:857ebc00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589cf8c r4:8589cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8589cf8c r4:857c6f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ebc00 r8:857c6f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:857c6f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:857ec800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:857ee000 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425fb0 to 0xe0425ff8) r5:857eb000 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xec565fb0 to 0xec565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8586a000 INFO: task kworker/1:880:5675 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a0329000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Not tainted 6.15.0-syzkaller #0 r5:857ea400 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/0:391 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:857c7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857c7f00 r8:8027ed34 r7:ec56de60 r6:85868400 r5:857e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec575fb0 to 0xec575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857e38c0 INFO: task kworker/0:391:5679 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:857f0000 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8586a740 INFO: task kworker/1:881:5683 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a0e07000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 task:kworker/1:882 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0425d20 to 0xe0425d68) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:857f2400 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85868700 r8:8027ed34 r7:ec55de60 r6:85868780 r5:857f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec571fb0 to 0xec571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8586a740 INFO: task kworker/1:883:5687 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:857f3000 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85868800 r8:8027ed34 r7:ec571e60 r6:85868880 r5:857f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec561fb0 to 0xec561ff8) INFO: task kworker/1:884:5689 is blocked on a mutex likely owned by task kworker/1:102:3666. r4:84af8400 Workqueue: events bpf_prog_free_deferred [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) INFO: task kworker/1:885:5690 is blocked on a mutex likely owned by task kworker/1:102:3666. r4:84af8400 Workqueue: events bpf_prog_free_deferred r5:857f4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc4de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85863400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:857f4800 r8:85868a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 INFO: task kworker/1:887:5695 blocked for more than 471 seconds. [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Workqueue: events bpf_prog_free_deferred [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 task:kworker/1:888 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8589fb8c r4:85868c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6000 r8:85868c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85868c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85868c00 r8:8027ed34 r7:ebc4de60 r6:85868c80 r5:857f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec589fb0 to 0xec589ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:85863240 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:857f6c00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857f0c00 r5:857f0c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:858a438c r4:85868e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a22eb000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:857ed400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85863880 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:857ed400 r8:85868f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:857f8000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:858a4b8c r4:85876000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:893:5707 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:893 state:D stack:0 pid:5707 tgid:5707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:857f8c00 r4:857f8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857f8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec599e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e3000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857f8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec599fb0 to 0xec599ff8) 5d20: a2ade000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84796640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fa0: 00000000 00000000 00000000 00000000 Call trace: [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:895:5712 blocked for more than 471 seconds. r5:857fb000 r4:829187f0 r4:00000000 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a5f8c r4:858a5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858a5f8c r4:85876300 Exception stack(0xec5adfb0 to 0xec5adff8) 5d60: 800d0013 ffffffff r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0425fb0 to 0xe0425ff8) [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:857fbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587a040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a578c r4:858a5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858a578c r4:85876400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:8587642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85876400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85876400 r8:8027ed34 r7:ec5ade60 r6:85876480 r5:857fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b1fb0 to 0xec5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587a000 INFO: task kworker/1:896:5714 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a3a2f000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:897:5715 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:ec5a9d84 r8:00000002 r7:60000113 r6:ec5a9d8c r5:857fc800 r5:857fc800 r4:829187f0 r4:00000000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85876500 r8:8027ed34 r7:ec5ade60 r6:85876580 r5:857fc800 Workqueue: events bpf_prog_free_deferred r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:857fd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587a640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba13000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a678c r4:858a6400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858a678c r4:85876600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fd400 r8:8587662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85876600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85876600 r8:8027ed34 r7:ec5ade60 r6:85876680 r5:857fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5b5fb0 to 0xec5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587a340 INFO: task kworker/1:898:5718 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:899:5719 blocked for more than 471 seconds. r5:857fe000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:8587a480 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85800000 r5:85800000 r4:829187f0 r4:00000000 r4:00000000 r5:858a6b8c r4:858a6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858a6b8c r4:85876800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85800000 r8:8587682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85876800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85876800 r8:8027ed34 r7:ec5b5e60 r6:85876880 r5:85800000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d1fb0 to 0xec5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587a680 INFO: task kworker/1:900:5723 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a426a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/1:901 state:D stack:0 pid:5724 tgid:5724 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85800c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85800c00 r8:8587692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec5bdd84 r8:00000002 r7:60000013 r6:ec5bdd8c r5:85801800 r4:00000000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a6f8c r4:858a6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858a6f8c r4:85876a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85801800 r8:85876a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85876a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85876a00 r8:8027ed34 r7:ec5d5e60 r6:85876a80 r5:85801800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5bdfb0 to 0xec5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587a240 INFO: task kworker/1:902:5725 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a48d2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:85803c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0425dc0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85863d80 INFO: task kworker/1:904:5730 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a4e77000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:905:5733 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:905 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5e9d84 r8:00000002 r7:60000013 r6:ec5e9d8c r5:85804800 r5:85804800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85876d00 9fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5735 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5f5d84 r8:00000002 r7:60000013 r6:ec5f5d8c r5:85805400 r4:85805400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85805400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587f300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85805400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858a7f8c r4:858a7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858a7f8c r4:85876e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85805400 r8:85876e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85876e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85876e00 r8:8027ed34 r7:ec5e9e60 r6:85876e80 r5:85805400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f5fb0 to 0xec5f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587f640 INFO: task kworker/1:906:5735 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:85806000 r4:829187f0 r4:00000000 r4:00000000 r5:858b078c r4:858b0400 r4:85876f00 Exception stack(0xec5f9fb0 to 0xec5f9ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5739 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5739 tgid:5739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5fdd84 r8:00000002 r7:60000113 r6:ec5fdd8c r5:85806c00 r4:85806c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85806c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5fde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85806c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc03000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85821f8c r4:85821c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85821f8c r4:8588a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85806c00 r8:8588a02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8588a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a000 r8:8027ed34 r7:ec5f9e60 r6:8588a080 r5:85806c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5fdfb0 to 0xec5fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587f5c0 INFO: task kworker/1:908:5739 is blocked on a mutex likely owned by task kworker/1:102:3666. Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:393:5741 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:393 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec601d84 r8:00000002 r7:60000113 r6:ec601d8c r5:85802400 r4:85802400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85802400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec601e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873fc0 r4:00000000 r9:83018005 r8:85802400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r10:61c88647 r9:85802400 r8:8588002c r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:857fec00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:857fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5743 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:910 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec609d84 r8:00000002 r7:60000013 r6:ec609d8c r5:85808000 r4:85808000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85808000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec609e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587fa00 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b0f8c r4:858b0c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b0f8c r4:8588a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808000 r8:8588a2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8588a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a280 r8:8027ed34 r7:ec5fde60 r6:8588a300 r5:85808000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec609fb0 to 0xec609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587f9c0 INFO: task kworker/1:910:5743 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:911:5746 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:911 state:D stack:0 pid:5746 tgid:5746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec60dd84 r8:00000002 r7:60000013 r6:ec60dd8c r5:85809800 r4:85809800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85809800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec60de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:911:5746 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a610e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:8580b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ec635d84 r8:00000002 r7:60000113 r6:ec635d8c r5:8580a400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587af00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8580a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b138c r4:858b1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b138c r4:8588a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580a400 r8:8588a52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8588a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a500 r8:8027ed34 r7:ec60de60 r6:8588a580 r5:8580a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec635fb0 to 0xec635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587ae80 INFO: task kworker/1:912:5750 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a6439000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 INFO: task kworker/1:913:5753 blocked for more than 471 seconds. r5:8580bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec615e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587fd80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8580bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b178c r4:858b1400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b178c r4:8588a600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580bc00 r8:8588a62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8588a600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588a600 r8:8027ed34 r7:ec60de60 r6:8588a680 r5:8580bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec615fb0 to 0xec615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8587fa80 INFO: task kworker/1:913:5753 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8580c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5756 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5756 tgid:5756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec611d84 r8:00000002 r7:60000013 r6:ec611d8c r5:8580d400 r4:8580d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8580d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588b200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8580d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8580e000 r5:8580e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588b2c0 r7:ddde2d40 r6:83018200 r5:858b238c r4:8588a880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:916:5760 blocked for more than 471 seconds. r5:8580ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588b500 r7:ddde2d40 r6:83018200 r5:858b278c r4:8588a980 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8588b1c0 INFO: task kworker/1:916:5760 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a78fe000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:917:5762 blocked for more than 471 seconds. r5:85808c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:858b2b8c r4:8588aa80 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5764 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec645d84 r8:00000002 r7:60000013 r6:ec645d8c r5:857fa400 r4:857fa400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857fa400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec645e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588b800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857fa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5c1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b2f8c r4:858b2c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858b2f8c r4:8588ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fa400 r8:8588abac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8588ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8588ab80 r8:8027ed34 r7:ec641e60 r6:8588ac00 r5:857fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec645fb0 to 0xec645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8588b5c0 INFO: task kworker/1:918:5764 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a7bc2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5765 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5765 tgid:5765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec64dd84 r8:00000002 r7:60000113 r6:ec64dd8c r5:84ab9800 r4:84ab9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ab9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec64de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8588bb80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r4:00000000 r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec649d84 r8:00000002 r7:60000113 r6:ec649d8c r5:84abd400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:5769 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec651d84 r8:00000002 r7:60000013 r6:ec651d8c r5:84abec00 r4:84abec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84abec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858987c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85823b8c r4:85823800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85823b8c r4:85880280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abec00 r8:858802ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85880280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85880280 r8:8027ed34 r7:ec631e60 r6:85880300 r5:84abec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85898240 INFO: task kworker/0:396:5769 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a8689000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r4:82ac11e4 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:84af1fc0 task:kworker/0:397 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84abe000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84abe000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec661e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898640 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84abe000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead09000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582378c r4:85823400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8582378c r4:85880380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84abe000 r8:858803ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85880380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85880380 r8:8027ed34 r7:ec651e60 r6:85880400 r5:84abe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec661fb0 to 0xec661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85898240 INFO: task kworker/0:397:5771 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: a8e23000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:398:5776 blocked for more than 471 seconds. r5:8574b000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:5777 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec669d84 r8:00000002 r7:60000013 r6:ec669d8c r5:85758000 r4:85758000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85758000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec669e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Not tainted 6.15.0-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85758c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3bf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84746f8c r4:84746c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84746f8c r4:85880680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85758c00 r8:858806ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85880680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85880680 r8:8027ed34 r7:ec65de60 r6:85880700 r5:85758c00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:858988c0 INFO: task kworker/0:400:5780 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Workqueue: events bpf_prog_free_deferred r4:00000000 r7:ddde2d40 r6:83018200 r5:858b378c r4:8588ad80 Exception stack(0xe0425d20 to 0xe0425d68) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Call trace: r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85898e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575a400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb775000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474678c r4:84746400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474678c r4:85880800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575a400 r8:8588082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85880800 r10:00000000 r9:85880800 r8:8027ed34 r7:ec65de60 r6:85880880 r5:8575a400 5d20: a9b1d000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Call trace: r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d60: 800d0013 ffffffff [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/0:403:5786 blocked for more than 472 seconds. r5:8575c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec685e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587e140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8575c800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85880a00 r8:8027ed34 r7:ec681e60 r6:85880a80 r5:8575c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r5:849a538c r4:849a5000 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8575e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:406:5793 blocked for more than 472 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec699e08 r10:00000000 r9:85880d00 r8:8027ed34 r7:ec68de60 r6:8588ae00 r5:85812400 5d60: 800d0013 ffffffff r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:5794 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec69dd84 r8:00000002 r7:60000013 r6:ec69dd8c r5:85810000 r4:85810000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85810000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec69de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587e680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85880d80 r4:8587e7c0 5d20: abe01000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:85831f8c r4:85831c00 r4:8587e800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:5798 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8575b000 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: ac756000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d60: 800d0013 ffffffff r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af1fc0 r5:84bd0000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af1fc0 r5:84bd0c00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8587ee40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bd0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebafb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583278c r4:85832400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8583278c r4:85871100 r10:61c88647 r9:84bd0c00 r8:8587112c r7:82804d40 r6:dddced40 r5:dddced60 5d60: 800d0013 ffffffff [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 r5:84bd1800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:84bd2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85869680 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bd2400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec539000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5d60: 800d0013 ffffffff [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) INFO: task kworker/1:922:5809 blocked for more than 472 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6f1e08 r10:00000000 r9:8588af00 r8:8027ed34 r7:ec649e60 r6:85871400 r5:84bd3000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: adf8c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 task:kworker/0:414 state:D stack:0 pid:5810 tgid:5810 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85871480 r8:8027ed34 r7:ec6a5e60 r6:85871500 r5:84bd5400 5d60: 800d0013 ffffffff r5:849a538c r4:849a5000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:415:5813 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 r5:84bd3c00 r4:829187f0 r4:00000000 r5:8583338c r4:85833000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:84bd6000 r4:829187f0 r9:83018005 r8:84bd6000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 INFO: task kworker/0:416:5814 is blocked on a mutex likely owned by task kworker/1:102:3666. r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84bd6c00 r4:829187f0 r9:83018005 r8:84bd6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:418:5819 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:5819 tgid:5819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec701d84 r8:00000002 r7:60000113 r6:ec701d8c r5:84bd4800 r4:84bd4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bd4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred r9:83018005 r8:85760000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 r7:dddced40 r6:83018000 r5:8583c78c r4:85871980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85760000 r8:858719ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85871980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85871980 r8:8027ed34 r7:ec701e60 r6:85871a00 r5:85760000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6fdfb0 to 0xec6fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85869700 INFO: task kworker/0:419:5820 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:85760c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec705fb0 to 0xec705ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85869800 INFO: task kworker/0:420:5822 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: 5d20: aebf0000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 Exception stack(0xe0425fb0 to 0xe0425ff8) r5:85761800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85762400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85763c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec721e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8586de00 r4:00000000 r5:00001000 r4:ec761000 1fa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 r5:849a538c r4:849a5000 r4:84af1fc0 INFO: task kworker/0:423:5831 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:423 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec70dd84 r8:00000002 r7:60000013 r6:ec70dd8c r5:85763000 r4:85763000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85763000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e0480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85765400 r4:829187f0 r5:00001000 r4:ec733000 r4:00000001 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec731d84 r8:00000002 r7:60000013 r6:ec731d8c r5:85766000 r4:85766000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85766000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec731e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e0780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85766000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec739000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85766000 r8:8586c0ac r7:82804d40 r6:dddced40 r5:dddced60 5d60: 800d0013 ffffffff [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 task:kworker/0:426 state:D stack:0 pid:5838 tgid:5838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:5839 tgid:5839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:85764800 r4:85764800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85764800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:8586c280 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 INFO: task kworker/0:428:5841 blocked for more than 472 seconds. r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec765e08 r4:8586c480 Call trace: r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec773000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8583ef8c r4:8583ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8583ef8c r4:8586c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8576b000 r8:8586c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8586c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586c580 r8:8027ed34 r7:ec765e60 r6:8586c600 r5:8576b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec771fb0 to 0xec771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857e0f00 Call trace: r4:e0425dc0 r4:84af8400 INFO: task kworker/0:431:5848 blocked for more than 472 seconds. r5:85816c00 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85816c00 r8:8586c6ac r7:82804d40 r6:dddced40 r5:dddced60 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85768000 r5:85768000 r4:829187f0 r5:00001000 r4:dfbf9000 r4:8586c700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8586c700 r8:8027ed34 r7:ec781e60 r6:8586c780 r5:85768000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857e4280 INFO: task kworker/0:432:5849 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:8576bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec77de08 r4:8586c800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: b0644000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af1fc0 r5:8576c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec785e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8584c78c r4:8586c900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8586c900 r4:857e43c0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 Not tainted 6.15.0-syzkaller #0 r5:8576d400 r4:829187f0 r9:83018005 r8:8576d400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:8584cf8c r4:8584cc00 1fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r5:8576ec00 r4:829187f0 r4:00000000 r10:61c88647 r9:8576ec00 r8:8586cc2c r7:82804d40 r6:dddced40 r5:dddced60 5d60: 800d0013 ffffffff r5:00001000 r4:dffd1000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:8576a400 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: b15ae000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857e4b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84be8000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8584d38c r4:8586ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a1e08 r4:8586cf00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857e4d80 INFO: task kworker/0:440:5866 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: b19e2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000001 Call trace: 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84bea400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bea400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8584df8c r4:857b1080 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:84af8400 Not tainted 6.15.0-syzkaller #0 r5:84beb000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b3140 r5:00001000 r4:eba1f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8584e78c r4:8584e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8584e78c r4:857b1180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84beb000 r8:857b11ac r7:82804d40 r6:dddced40 r5:dddced60 r4:857b1180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b1180 r8:8027ed34 r7:ec7a5e60 r6:857b1200 r5:84beb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/0:444 state:D stack:0 pid:5874 tgid:5874 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b3340 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:5876 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:5876 tgid:5876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84bec800 r4:829187f0 r4:00000000 r4:857b1380 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/0:446 state:D stack:0 pid:5878 tgid:5878 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84bed400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7b9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b3680 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Call trace: r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7bdd84 r8:00000002 r7:60000113 r6:ec7bdd8c r5:84bee000 r4:84bee000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bee000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857b3700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bee000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbb3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:857b3640 r5:800d0013 r4:80239bd0 r5:00001000 r4:dffd1000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84beec00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfa0: 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c1e08 r4:00000001 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:5886 blocked for more than 473 seconds. task:kworker/0:450 state:D stack:0 pid:5886 tgid:5886 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: b49a7000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Not tainted 6.15.0-syzkaller #0 r5:858e9800 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:5890 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7d1e08 r10:61c88647 r9:858ea400 r8:857b1aac r7:82804d40 r6:dddced40 r5:dddced60 5d60: 800d0013 ffffffff r5:849a538c r4:849a5000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85854f8c r4:85854c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85854f8c r4:857b1b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858eb000 r8:857b1bac r7:82804d40 r6:dddced40 r5:dddced60 r4:857b1b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b1b80 r8:8027ed34 r7:ec78de60 r6:857b1c00 r5:858eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:858ebc00 r4:829187f0 r4:00000000 r4:857b1c80 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:5896 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:5896 tgid:5896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7e5d84 r8:00000002 r7:60000013 r6:ec7e5d8c r5:85816000 r4:85816000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d60: 800d0013 ffffffff [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85814800 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e9e08 r10:61c88647 r9:85814800 r8:857b1e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:857b1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b1e00 r8:8027ed34 r7:ec7e5e60 r6:857d0100 r5:85814800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e9fb0 to 0xec7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856dc4c0 INFO: task kworker/0:456:5897 is blocked on a mutex likely owned by task kworker/1:102:3666. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r7:dddced40 r6:83018000 r5:85855b8c r4:857b1e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85813c00 r8:857b1eac r7:82804d40 r6:dddced40 r5:dddced60 r4:857b1e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:857b1e80 r8:8027ed34 r7:ec7e5e60 r6:857d0180 r5:85813c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f1fb0 to 0xec7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856dc600 INFO: task kworker/0:457:5899 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:85815400 r4:829187f0 r4:00000000 r5:85855f8c r4:85855c00 r4:856dc480 r4:82ac11e4 r5:849a538c r4:849a5000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: b71b9000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85818000 r4:829187f0 r9:83018005 r8:85818000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85818c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856dca40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 r7:dddced40 r6:83018000 r5:85856b8c r4:856d4080 Call trace: r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec815d84 r8:00000002 r7:60000113 r6:ec815d8c r5:85819800 r4:85819800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85819800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xec815fb0 to 0xec815ff8) r5:800d0013 r4:80239bd0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/0:463 state:D stack:0 pid:5912 tgid:5912 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced40 r6:83018000 r5:8585738c r4:856d4180 r10:00000000 r9:856d4180 r8:8027ed34 r7:ec7e5e60 r6:857d0480 r5:8581a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec82dfb0 to 0xec82dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856dcb00 INFO: task kworker/0:463:5912 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r7:dddced40 r6:83018000 r5:8585778c r4:856d4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8581c800 r8:856d422c r7:82804d40 r6:dddced40 r5:dddced60 r4:856d4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d4200 r8:8027ed34 r7:ec7e5e60 r6:857d0500 r5:8581c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec83dfb0 to 0xec83dff8) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:8581b000 r4:00000000 r7:dddced40 r6:83018000 r5:85857b8c r4:856d4280 Call trace: r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:8581d400 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8581e000 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec86de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bf7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8581bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b4178c r4:84b41400 r10:61c88647 r9:8581bc00 r8:856d442c r7:82804d40 r6:dddced40 r5:dddced60 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec871e08 r4:856d4480 r4:856bf2c0 r4:82ac11e4 r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:5925 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:5925 tgid:5925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r7:dddced40 r6:83018000 r5:84b40f8c r4:856d4500 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/0:472 state:D stack:0 pid:5930 tgid:5930 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:ec7c5d84 r8:00000002 r7:60000013 r6:ec7c5d8c r5:858ed400 r4:858ed400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858ed400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7c5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018005 r8:858ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r4:856bf800 r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:5932 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:5932 tgid:5932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec895d84 r8:00000002 r7:60000113 r6:ec895d8c r5:847f8000 r4:847f8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847f8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eba45000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0425dc0 r5:849a538c r4:849a5000 Exception stack(0xe0425fb0 to 0xe0425ff8) r5:847f9800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8ade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bfc80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:847f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8a1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:856d4980 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 r9:83018205 r8:85948c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: baa7f000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Not tainted 6.15.0-syzkaller #0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xec769fb0 to 0xec769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bfd80 INFO: task kworker/0:475:5938 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856bfd80 INFO: task kworker/0:476:5939 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8c5e08 r4:856d4b00 Workqueue: events bpf_prog_free_deferred 5d20: bb3ac000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 r4:84af1fc0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:84b42f8c r4:84b42c00 r4:856ab2c0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:8594c800 r8:856d4c2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xec8d1fb0 to 0xec8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Call trace: 5d20: bbfa0000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:849a538c r4:849a5000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r7:dddced40 r6:83018000 r5:84b43b8c r4:856d4d00 Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:5952 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:482 state:D stack:0 pid:5952 tgid:5952 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8594e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e9e08 r5:8591478c r4:85914400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) Exception stack(0xe0425fb0 to 0xe0425ff8) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000001 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:84af8400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8f5d84 r8:00000002 r7:60000113 r6:ec8f5d8c r5:85811800 r4:85811800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85811800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856abc00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85811800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:00000000 r4:00000000 r4:84af8400 task:kworker/0:485 state:D stack:0 pid:5957 tgid:5957 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fb000 r8:8569502c r7:82804d40 r6:dddced40 r5:dddced60 r4:85695000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85695000 r8:8027ed34 r7:ec8f5e60 r6:85695080 r5:847fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856abb40 INFO: task kworker/0:486:5960 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: bd82e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:84af8400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r7:dddced40 r6:83018000 r5:85915b8c r4:85695100 Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec905d84 r8:00000002 r7:60000113 r6:ec905d8c r5:847fc800 r4:847fc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:847fc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec905e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bff00 r4:00000001 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred r4:00000000 r7:dddced40 r6:83018000 r5:85916b8c r4:85695300 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec909fb0 to 0xec909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856880c0 INFO: task kworker/0:489:5966 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec541000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85915f8c r4:85915c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85915f8c r4:85695400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fe000 r8:8569542c r7:82804d40 r6:dddced40 r5:dddced60 r4:85695400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r4:e0425dc0 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:8591638c r4:85916000 r4:85688300 5d60: 800d0013 ffffffff [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:5973 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec915d84 r8:00000002 r7:60000113 r6:ec915d8c r5:858ec800 r4:858ec800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858ec800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r4:84af8400 Not tainted 6.15.0-syzkaller #0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85916f8c r4:85916c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85916f8c r4:85695700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847fec00 r8:8569572c r7:82804d40 r6:dddced40 r5:dddced60 r4:85695700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85695700 r8:8027ed34 r7:ec909e60 r6:85695780 r5:847fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec919fb0 to 0xec919ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85952400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85688ac0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000001 Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 r4:84af1fc0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) Exception stack(0xec931fb0 to 0xec931ff8) 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:497 state:D stack:0 pid:5982 tgid:5982 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:00000000 r9:85695980 r8:8027ed34 r7:ec92de60 r6:857d0f80 r5:85951800 r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:00000000 r9:85695a00 r8:8027ed34 r7:ec92de60 r6:85642000 r5:85953c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85688cc0 INFO: task kworker/0:498:5984 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: c0662000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5d60: 800d0013 ffffffff r5:849a538c r4:849a5000 r4:84af1fc0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:5990 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000001 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:85695c00 Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85950c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d578c r4:858d5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85950c00 r8:856422ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:85695c80 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:00000000 r9:85642380 r8:8027ed34 r7:ec91de60 r6:85642480 r5:85958c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85680fc0 INFO: task kworker/1:926:5999 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: c2157000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:84af8400 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:504 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:8595a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/0:505 state:D stack:0 pid:6003 tgid:6003 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Workqueue: events bpf_prog_free_deferred r5:849a538c r4:849a5000 task:kworker/0:507 state:D stack:0 pid:6006 tgid:6006 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced40 r6:83018000 r5:8591a38c r4:85695e80 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:508:6009 blocked for more than 474 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85635e80 Workqueue: events bpf_prog_free_deferred r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:8591ab8c r4:8591a800 r4:85635980 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:927:6012 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:927 state:D stack:0 pid:6012 tgid:6012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9e1d84 r8:00000002 r7:60000113 r6:ec9e1d8c r5:8595d400 r4:8595d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8595d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9e1e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628b80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8594ec00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) dfa0: 00000000 00000000 00000000 00000000 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Not tainted 6.15.0-syzkaller #0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85635f80 r10:61c88647 r9:85960000 r8:8562c0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8562c080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562c080 r8:8027ed34 r7:ec9fde60 r6:85642980 r5:85960000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca01fb0 to 0xeca01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:800d0013 r4:80239bd0 r4:84af8400 Not tainted 6.15.0-syzkaller #0 r5:85961800 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85963000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8591bf8c r4:8562c200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85962400 r8:8562c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8562c200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562c200 r8:8027ed34 r7:eca0de60 r6:85642b00 r5:85962400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca29fb0 to 0xeca29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626280 INFO: task kworker/0:514:6022 is blocked on a mutex likely owned by task kworker/1:102:3666. Workqueue: events bpf_prog_free_deferred r4:00000000 r4:84af8400 task:kworker/0:515 state:D stack:0 pid:6024 tgid:6024 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/0:515:6024 is blocked on a mutex likely owned by task kworker/1:102:3666. r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) r5:85964800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5d20: c5067000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:84af8400 task:kworker/1:929 state:D stack:0 pid:6031 tgid:6031 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:930 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec821d84 r8:00000002 r7:60000113 r6:ec821d8c r5:85966000 r4:85966000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85966000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec821e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562b2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85966000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb887000 r10:61c88647 r9:85966000 r8:85642e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 Not tainted 6.15.0-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec825e08 r4:85642f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85642f00 r8:8027ed34 r7:ec821e60 r6:85642f80 r5:85966c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec825fb0 to 0xec825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85628ec0 INFO: task kworker/1:931:6033 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:829187f4 r9:ec7f9d84 r8:00000002 r7:60000113 r6:ec7f9d8c r5:85963c00 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:84af8400 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:933:6038 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:933 state:D stack:0 pid:6038 tgid:6038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec865d84 r8:00000002 r7:60000113 r6:ec865d8c r5:8595ec00 r4:8595ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8595ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r5:800d0013 r4:80239bd0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:934:6039 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:934 state:D stack:0 pid:6039 tgid:6039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca3dd84 r8:00000002 r7:60000013 r6:eca3dd8c r5:84898000 r4:84898000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84898000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85447140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84898000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:935:6042 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:935 state:D stack:0 pid:6042 tgid:6042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca41d84 r8:00000002 r7:60000113 r6:eca41d8c r5:84898c00 r4:84898c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84898c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb799000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d738c r4:858d7000 r4:00000001 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84899800 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626d00 INFO: task kworker/0:516:6043 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: c76a7000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8489b000 r4:829187f0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) INFO: task kworker/0:517:6045 is blocked on a mutex likely owned by task kworker/1:102:3666. r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8489bc00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r7:dddced40 r6:83018000 r5:85921f8c r4:8562c400 Exception stack(0xe0425d20 to 0xe0425d68) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca61e08 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: c7c1c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:85921b8c r4:85921800 r4:85626ec0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592378c r4:8562c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8489ec00 r8:8562c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8562c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562c580 r8:8027ed34 r7:eca5de60 r6:85622680 r5:8489ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca71fb0 to 0xeca71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000001 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:8562c680 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: c8a59000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 r5:00001000 r4:dffd1000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca7de08 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 r5:849a538c r4:849a5000 r4:84af1fc0 r5:85968000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795840 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425fb0 to 0xe0425ff8) r5:8596b000 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8596b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc9f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85922f8c r4:85922c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85922f8c r4:8562c780 r4:00000001 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r5:849a538c r4:849a5000 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca95d84 r8:00000002 r7:60000113 r6:eca95d8c r5:8596a400 r4:8596a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8596a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df200 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/0:527 state:D stack:0 pid:6065 tgid:6065 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855df3c0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 INFO: task kworker/0:528:6067 blocked for more than 475 seconds. r5:8596bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaa5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dfb80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8596bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8592538c r4:8562c900 Call trace: r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Not tainted 6.15.0-syzkaller #0 r5:8596c800 r4:829187f0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:6072 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecab9d84 r8:00000002 r7:60000113 r6:ecab9d8c r5:8596d400 r4:8596d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8596d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:84af8400 task:kworker/0:531 state:D stack:0 pid:6073 tgid:6073 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: cade1000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 INFO: task kworker/0:532:6075 blocked for more than 475 seconds. r5:84823c00 r4:829187f0 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) 5fa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:84824800 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec831000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85924f8c r4:85924c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85924f8c r4:8562cc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84824800 r8:8562cc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8562cc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562cc00 r8:8027ed34 r7:ecaa5e60 r6:8562cc80 r5:84824800 Call trace: r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:84825400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:84826000 r4:829187f0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af1fc0 r5:84826c00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84822400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec88d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592678c r4:85926400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592678c r4:8552b000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84822400 r8:8552b02c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:537:6086 is blocked on a mutex likely owned by task kworker/1:102:3666. r5:00001000 r4:dffd1000 r4:84af8400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84823000 r4:829187f0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626ec0 INFO: task kworker/0:538:6088 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: cc5e4000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:84821800 r4:829187f0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425fb0 to 0xe0425ff8) r5:85971800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854708c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85971800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb0f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84820c00 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85926f8c r4:85926c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85926f8c r4:8552b380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84820c00 r8:8552b3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8552b380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552b380 r8:8027ed34 r7:ecae9e60 r6:8552b400 r5:84820c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae1fb0 to 0xecae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:800d0013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r5:849a538c r4:849a5000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85908c00 r5:85908c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85470600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85908c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecafb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592778c r4:85927400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592778c r4:8552b580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85908c00 r8:8552b5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8552b580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552b580 r8:8027ed34 r7:ecae9e60 r6:8552b600 r5:85908c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf9fb0 to 0xecaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854705c0 INFO: task kworker/0:543:6098 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: cd12a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 INFO: task kworker/0:544:6099 blocked for more than 475 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 Exception stack(0xecb09fb0 to 0xecb09ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85470940 INFO: task kworker/0:544:6099 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85973c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb1de08 r4:8552b700 INFO: task kworker/0:545:6102 is blocked on a mutex likely owned by task kworker/1:102:3666. r5:849a538c r4:849a5000 r4:84af1fc0 r5:85909800 r4:829187f0 r4:00000000 r4:8552b780 Workqueue: events bpf_prog_free_deferred [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8590a400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0425dc0 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:8590b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb25f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d38c r4:8592d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592d38c r4:8552b980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8590b000 r8:8552b9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8552b980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8552b980 r8:8027ed34 r7:ecb1de60 r6:8552ba00 r5:8590b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb0dfb0 to 0xecb0dff8) dfa0: 00000000 00000000 00000000 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 INFO: task kworker/0:549:6113 blocked for more than 475 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8590e000 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:6115 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec94dd84 r8:00000002 r7:60000113 r6:ec94dd8c r5:8590bc00 r4:8590bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85447100 INFO: task kworker/1:936:6116 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: cfa7e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/1:937 state:D stack:0 pid:6118 tgid:6118 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85975400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85447500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85975400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84233f8c r4:84233c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85622f00 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 task:kworker/1:939 state:D stack:0 pid:6123 tgid:6123 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:6125 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:6125 tgid:6125 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:85976c00 r8:8545912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:800d0013 r4:80239bd0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:941:6127 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:941 state:D stack:0 pid:6127 tgid:6127 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:942:6129 blocked for more than 475 seconds. r5:8509a400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:8509b000 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:6132 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:6132 tgid:6132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85099800 r4:829187f0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/1:945 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8598578c r4:85985400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 INFO: task kworker/1:946:6137 blocked for more than 475 seconds. r5:8509c800 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/0:552 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec75f000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454f00 INFO: task kworker/0:552:6139 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d2167000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) 9fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8509ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592e38c r4:8592e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592e38c r4:85466200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509ec00 r8:8546622c r7:82804d40 r6:dddced40 r5:dddced60 r4:85466200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85466200 r8:8027ed34 r7:ec8e1e60 r6:85466280 r5:8509ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 task:kworker/1:948 state:D stack:0 pid:6145 tgid:6145 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8509bc00 r8:8545962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85459600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85459600 r8:8027ed34 r7:ecb49e60 r6:85466300 r5:8509bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:85973000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8546d400 INFO: task kworker/1:949:6147 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0013 r4:80239bd0 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85970000 r5:85970000 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:951 state:D stack:0 pid:6151 tgid:6151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:8596ec00 r4:8596ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8596ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:8596e000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecaa9d84 r8:00000002 r7:60000113 r6:ecaa9d8c r5:859e1800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85466380 r8:8027ed34 r7:ec9ede60 r6:85459b00 r5:859e1800 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d407c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/1:953 state:D stack:0 pid:6162 tgid:6162 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:859e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:8546dd40 r5:800d0013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb6de08 r4:85466400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85466400 r8:8027ed34 r7:ecaa9e60 r6:85459c80 r5:859e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8546f580 INFO: task kworker/0:555:6163 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 task:kworker/0:556 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8592eb8c r4:8592e800 INFO: task kworker/0:556:6164 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d4b0b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:859e4800 r4:829187f0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:859e5400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:859e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85987f8c r4:85987c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85987f8c r4:85459e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e5400 r8:85459eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:85466500 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb65d84 r8:00000002 r7:60000013 r6:ecb65d8c r5:8590c800 r4:8590c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8590c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f9c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8590c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/0:559 state:D stack:0 pid:6171 tgid:6171 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85098c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546fc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85098c00 r8:8546672c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 Exception stack(0xecb81fb0 to 0xecb81ff8) r4:8546fc00 INFO: task kworker/0:560:6175 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d5f6d000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:85978c00 r4:829187f0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:6178 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 r5:85979800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d7329000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8597bc00 r5:8597bc00 r4:829187f0 r5:00001000 r4:ec789000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:829187f4 r9:ecb9dd84 r8:00000002 r7:60000113 r6:ecb9dd8c r5:8597c800 r9:83018005 r8:8597c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:ec7e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593d38c r4:8593d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593d38c r4:85466e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8597c800 r8:85466e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85466e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85466e00 r8:8027ed34 r7:ecb95e60 r6:85466e80 r5:8597c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8544c100 INFO: task kworker/0:566:6186 is blocked on a mutex likely owned by task kworker/1:102:3666. Workqueue: events bpf_prog_free_deferred r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8597d400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Call trace: r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/0:568 state:D stack:0 pid:6191 tgid:6191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecba5d84 r8:00000002 r7:60000013 r6:ecba5d8c r5:8597e000 r4:8597e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8597e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c580 r7:dddced40 r6:83018000 r5:8593db8c r4:85449000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:859e2400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593e38c r4:8593e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593e38c r4:85449100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e2400 r8:8544912c r7:82804d40 r6:dddced40 r5:dddced60 r4:85449100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449100 r8:8027ed34 r7:ecba5e60 r6:85459f80 r5:859e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8597ec00 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec829000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593df8c r4:8593dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593df8c r4:85449180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8597ec00 r8:854491ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8544ca00 INFO: task kworker/0:570:6194 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: 5d60: 800d0013 ffffffff r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:571:6196 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:6196 tgid:6196 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85100000 r4:829187f0 r4:00000000 r5:00001000 r4:ec85d000 Exception stack(0xecbadfb0 to 0xecbadff8) 5d60: 800d0013 ffffffff r5:849a538c r4:849a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:572 state:D stack:0 pid:6197 tgid:6197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:85100c00 r4:85100c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85100c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 9fa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb9e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d90e2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/0:574 state:D stack:0 pid:6203 tgid:6203 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa1c0 r4:85449580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:00000001 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:6204 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:6204 tgid:6204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbc5d84 r8:00000002 r7:60000013 r6:ecbc5d8c r5:85103000 r4:85103000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85103000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544cec0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85103c00 r4:829187f0 r9:83018005 r8:85103c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec945000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593f78c r4:8593f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593f78c r4:85449780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85103c00 r8:854497ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449780 r8:8027ed34 r7:ecbbde60 r6:85449800 r5:85103c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000001 INFO: task kworker/0:577:6208 blocked for more than 476 seconds. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:85449880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fa180 INFO: task kworker/0:577:6208 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d9c36000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:578:6210 blocked for more than 476 seconds. r5:85105400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:6211 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:6211 tgid:6211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbc1d84 r8:00000002 r7:60000013 r6:ecbc1d8c r5:85106000 r4:85106000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85106000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85106000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b438c r4:856b4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: da87a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859b8c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec983000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b478c r4:856b4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b478c r4:85449b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b8c00 r8:85449bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449b80 r8:8027ed34 r7:ecbd1e60 r6:85449c00 r5:859b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd9fb0 to 0xecbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fa680 INFO: task kworker/0:580:6214 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:581:6215 blocked for more than 476 seconds. r5:859ba400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:856b538c r4:85449c80 Exception stack(0xecbddfb0 to 0xecbddff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:582:6217 blocked for more than 476 seconds. r5:859b8000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fac40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b4f8c r4:856b4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b4f8c r4:85449d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b8000 r8:85449dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449d80 r8:8027ed34 r7:ecbdde60 r6:85449e00 r5:859b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fa900 INFO: task kworker/0:582:6217 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: db3c2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:859bbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2040 r10:61c88647 r9:859bbc00 r8:85449eac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: db992000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/1:956 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85994f8c r4:85994c00 r10:00000000 r9:85459980 r8:8027ed34 r7:ecb75e60 r6:853e2000 r5:859e9800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: db992000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:6223 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbedd84 r8:00000002 r7:60000113 r6:ecbedd8c r5:859e8000 r4:859e8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859e8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:859ea400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:859ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r7:dddced40 r6:83018000 r5:856b5b8c r4:853ed000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ea400 r8:853ed02c r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed000 r8:8027ed34 r7:ecbede60 r6:853e2100 r5:859ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca05fb0 to 0xeca05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f2100 INFO: task kworker/0:585:6225 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: dbead000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:859eb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecbe9fb0 to 0xecbe9ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859ec800 r5:859ec800 r4:829187f0 r4:00000000 r4:00000000 r5:856b638c r4:856b6000 r10:00000000 r9:853ed100 r8:8027ed34 r7:ecbe9e60 r6:853e2200 r5:859ec800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:6233 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc05d84 r8:00000002 r7:60000113 r6:ecc05d8c r5:859ee000 r4:859ee000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859ee000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec675000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b738c r4:856b7000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b738c r4:853ed180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ee000 r8:853ed1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed180 r8:8027ed34 r7:ecbe9e60 r6:853e2280 r5:859ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f2800 INFO: task kworker/0:588:6233 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: dccbe000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:859ebc00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:6236 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:6236 tgid:6236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbf1d84 r8:00000002 r7:60000013 r6:ecbf1d8c r5:859b9800 r4:859b9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f29c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec547000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b6f8c r4:856b6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b6f8c r4:853ed280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b9800 r8:853ed2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed280 r8:8027ed34 r7:ecc05e60 r6:853ed300 r5:859b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859bc800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2bc0 r7:dddced40 r6:83018000 r5:856b778c r4:853ed380 Exception stack(0xecc11fb0 to 0xecc11ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/0:592 state:D stack:0 pid:6241 tgid:6241 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ec72b000 r10:61c88647 r9:859bd400 r8:853ed4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed480 r8:8027ed34 r7:ecc11e60 r6:853ed500 r5:859bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f2c00 INFO: task kworker/0:592:6241 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: dd7a3000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:6243 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:6243 tgid:6243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc19d84 r8:00000002 r7:60000113 r6:ecc19d8c r5:859be000 r4:859be000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859be000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546cc80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ec753000 r10:61c88647 r9:859be000 r8:853ed5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853f2d00 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859bec00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d30c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:6247 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:6247 tgid:6247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc21d84 r8:00000002 r7:60000113 r6:ecc21d8c r5:859bb000 r4:859bb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546d740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1c38c r4:85a1c000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1c38c r4:853ed780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bb000 r8:853ed7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed780 r8:8027ed34 r7:ecc1de60 r6:853ed800 r5:859bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc21fb0 to 0xecc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853faf40 INFO: task kworker/0:595:6247 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecc25d84 r8:00000002 r7:60000013 r6:ecc25d8c r5:85106c00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853ed880 r8:8027ed34 r7:ecc1de60 r6:853ed900 r5:85106c00 Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:6252 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbf5d84 r8:00000002 r7:60000013 r6:ecbf5d8c r5:84890c00 r4:84890c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84890c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84890c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1cb8c r4:85a1c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1cb8c r4:853ed980 r10:00000000 r9:853ed980 r8:8027ed34 r7:ecc1de60 r6:853eda00 r5:84890c00 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84891800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3300 r7:dddced40 r6:83018000 r5:85a1d38c r4:853eda80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:800d0013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:84892400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1d78c r4:85a1d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1d78c r4:853edb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84892400 r8:853edbac r7:82804d40 r6:dddced40 r5:dddced60 r4:853edb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853edb80 r8:8027ed34 r7:ecc2de60 r6:853edc00 r5:84892400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d35c0 INFO: task kworker/0:599:6256 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: df051000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:6257 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84893000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: df051000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:84893c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84893c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1df8c r4:85a1dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1df8c r4:853edd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893c00 r8:853eddac r7:82804d40 r6:dddced40 r5:dddced60 r4:853edd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853edd80 r8:8027ed34 r7:ecc29e60 r6:853ede00 r5:84893c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc35fb0 to 0xecc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d3540 INFO: task kworker/0:601:6260 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: df60a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84894800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3a00 r7:dddced40 r6:83018000 r5:85a1e78c r4:853ede80 Exception stack(0xecc39fb0 to 0xecc39ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84895400 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:6265 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:6265 tgid:6265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc41d84 r8:00000002 r7:60000013 r6:ecc41d8c r5:84896000 r4:84896000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84896000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84896000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1eb8c r4:85a1e800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1eb8c r4:852bb080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896000 r8:852bb0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb080 r8:8027ed34 r7:ecc39e60 r6:852bb100 r5:84896000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d3900 INFO: task kworker/0:604:6265 is blocked on a mutex likely owned by task kworker/1:102:3666. Call trace: 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84896c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: e049e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:6269 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc51d84 r8:00000002 r7:60000113 r6:ecc51d8c r5:859eec00 r4:859eec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859eec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1ef8c r4:85a1ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1ef8c r4:852bb280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859eec00 r8:852bb2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb280 r8:8027ed34 r7:ecc45e60 r6:853e2380 r5:859eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc51fb0 to 0xecc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84af1fc0 Call trace: r5:859e0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca79000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1f38c r4:85a1f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1f38c r4:852bb300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e0000 r8:852bb32c r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb300 r8:8027ed34 r7:ecc45e60 r6:853e2400 r5:859e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc59fb0 to 0xecc59ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:608:6274 blocked for more than 477 seconds. r5:859ed400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1fb8c r4:85a1f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1fb8c r4:852bb380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ed400 r8:852bb3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb380 r8:8027ed34 r7:ecc45e60 r6:853e2480 r5:859ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4280 INFO: task kworker/0:608:6274 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r4:859e8c00 r5:859e8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc69e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e8c00 r8:852bb42c r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb400 r8:8027ed34 r7:ecc65e60 r6:853e2500 r5:859e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4280 INFO: task kworker/0:609:6275 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e1353000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84890000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84890000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1ff8c r4:85a1fc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1ff8c r4:852bb480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84890000 r8:852bb4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb480 r8:8027ed34 r7:ecc69e60 r6:852bb500 r5:84890000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4080 INFO: task kworker/0:610:6276 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 INFO: task kworker/0:611:6279 blocked for more than 477 seconds. r5:84958000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84958000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2838c r4:85a28000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2838c r4:852bb580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958000 r8:852bb5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb580 r8:8027ed34 r7:ecc69e60 r6:852bb600 r5:84958000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc6dfb0 to 0xecc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b45c0 INFO: task kworker/0:611:6279 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e1b56000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84958c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a2878c r4:852bb680 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e219f000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 r5:84959800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85a28f8c r4:85a28c00 r10:00000000 r9:852bb780 r8:8027ed34 r7:ecc69e60 r6:852bb800 r5:84959800 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:6285 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:6285 tgid:6285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:8495a400 r4:8495a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8495a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb11000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2938c r4:85a29000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2938c r4:852bb880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495a400 r8:852bb8ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8495b000 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:6289 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc81d84 r8:00000002 r7:60000013 r6:ecc81d8c r5:8495bc00 r4:8495bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4d00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8495bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb33000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a29b8c r4:85a29800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a29b8c r4:852bba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495bc00 r8:852bbaac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecc81fb0 to 0xecc81ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/0:617:6291 blocked for more than 477 seconds. r5:8495c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc85e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:852bbb80 r8:8027ed34 r7:ecc81e60 r6:852bbc00 r5:8495c800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ecc8dd84 r8:00000002 r7:60000113 r6:ecc8dd8c r5:8495d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2ab8c r4:85a2a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2ab8c r4:852bbc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495d400 r8:852bbcac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bbc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bbc80 r8:8027ed34 r7:ecc85e60 r6:852bbd00 r5:8495d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc8dfb0 to 0xecc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4ec0 INFO: task kworker/0:618:6294 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e3499000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8495e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8495e000 r8:852bbdac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecca9d84 r8:00000002 r7:60000013 r6:ecca9d8c r5:8495ec00 r4:8495ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8495ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599438c r4:85994000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599438c r4:853e2580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495ec00 r8:853e25ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e2580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2580 r8:8027ed34 r7:ecbd5e60 r6:852bbe80 r5:8495ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852d3340 INFO: task kworker/1:957:6296 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e38c7000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:859d0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:852a52c0 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r5:00001000 r4:dffd1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:6301 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb9d84 r8:00000002 r7:60000013 r6:eccb9d8c r5:859d0c00 r4:859d0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2b78c r4:85a2b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2b78c r4:85226000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d0c00 r8:8522602c r7:82804d40 r6:dddced40 r5:dddced60 r4:85226000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226000 r8:8027ed34 r7:ecc9de60 r6:85226080 r5:859d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb9fb0 to 0xeccb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859d1800 r5:859d1800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a2b38c r4:85a2b000 r4:85226100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226100 r8:8027ed34 r7:eccb9e60 r6:85226180 r5:859d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5780 INFO: task kworker/0:622:6303 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e47ab000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/1:958 state:D stack:0 pid:6305 tgid:6305 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859d2400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853e2600 r8:8027ed34 r7:ecbd5e60 r6:85226200 r5:859d2400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r4:84af1fc0 Call trace: r5:859d3000 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85226280 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:6309 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:6309 tgid:6309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccddd84 r8:00000002 r7:60000013 r6:eccddd8c r5:859d3c00 r4:859d3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a58c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2bb8c r4:85a2b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2bb8c r4:85226380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d3c00 r8:852263ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226380 r8:8027ed34 r7:ecccde60 r6:85226400 r5:859d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccddfb0 to 0xeccddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5900 INFO: task kworker/0:624:6309 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e4dce000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859f0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a3438c r4:85226480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e4dce000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/0:626 state:D stack:0 pid:6313 tgid:6313 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859f1800 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:859f1800 r8:8522652c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:626:6313 is blocked on a mutex likely owned by task kworker/1:102:3666. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:6314 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd05d84 r8:00000002 r7:60000113 r6:ecd05d8c r5:859f2400 r4:859f2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb57000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a34b8c r4:85a34800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a34b8c r4:85226580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f2400 r8:852265ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226580 r8:8027ed34 r7:ecd01e60 r6:853e2780 r5:859f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5f00 INFO: task kworker/0:627:6314 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e547a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:628:6316 blocked for more than 477 seconds. r5:859f3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203900 r5:85a36b8c r4:85a36800 r4:85226600 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd11d84 r8:00000002 r7:60000113 r6:ecd11d8c r5:859f4800 r4:859f4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd11e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a34f8c r4:85a34c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a34f8c r4:85226680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f4800 r8:852266ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226680 r8:8027ed34 r7:ecd09e60 r6:853e2880 r5:859f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd11fb0 to 0xecd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5f40 INFO: task kworker/0:629:6318 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e58dd000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859f3c00 r4:829187f0 r4:00000000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203280 INFO: task kworker/0:630:6320 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e58dd000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:859f5400 r5:859f5400 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85226780 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859f6c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a35b8c r4:85a35800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a35b8c r4:85226800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f6c00 r8:8522682c r7:82804d40 r6:dddced40 r5:dddced60 r4:85226800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226800 r8:8027ed34 r7:ecd09e60 r6:853e2a00 r5:859f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203240 INFO: task kworker/0:632:6324 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e647e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:633:6326 blocked for more than 477 seconds. r5:859f0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852033c0 INFO: task kworker/0:633:6326 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e647e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r4:84af1fc0 task:kworker/0:634 state:D stack:0 pid:6328 tgid:6328 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859e6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd35e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85226900 r8:8027ed34 r7:ecd09e60 r6:853e2b00 r5:859e6000 Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:635:6331 blocked for more than 477 seconds. r5:859e6c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc51000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3678c r4:85a36400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3678c r4:85226980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e6c00 r8:852269ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226980 r8:8027ed34 r7:ecd09e60 r6:853e2b80 r5:859e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203800 INFO: task kworker/0:635:6331 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e647e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85a36f8c r4:85a36c00 r10:00000000 r9:85226a00 r8:8027ed34 r7:ecd09e60 r6:853e2c00 r5:859f6000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a3838c r4:85a38000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3838c r4:85226a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c8000 r8:85226aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226a80 r8:8027ed34 r7:ecd3de60 r6:853e2c80 r5:859c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd1dfb0 to 0xecd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203a80 INFO: task kworker/0:637:6335 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e6c1b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:638:6337 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:638 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a3738c r4:85226b00 Exception stack(0xecd31fb0 to 0xecd31ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:959:6340 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccf1d84 r8:00000002 r7:60000113 r6:eccf1d8c r5:859c9800 r4:859c9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3f38c r4:85a3f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a3f38c r4:853e2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c9800 r8:853e2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2d80 r8:8027ed34 r7:ecbd5e60 r6:853e2e00 r5:859c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515c2c0 INFO: task kworker/1:959:6340 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8599578c r4:853e2e80 Exception stack(0xecd45fb0 to 0xecd45ff8) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec879000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3778c r4:85a37400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3778c r4:85226b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859cb000 r8:85226bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226b80 r8:8027ed34 r7:ecd1de60 r6:853e2f80 r5:859cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203cc0 INFO: task kworker/0:639:6344 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e76eb000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd4de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: e76eb000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:6348 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:6348 tgid:6348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd51d84 r8:00000002 r7:60000013 r6:ecd51d8c r5:859cc800 r4:859cc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859cc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a37f8c r4:85a37c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a37f8c r4:85226c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859cc800 r8:85226cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226c80 r8:8027ed34 r7:ecd1de60 r6:851f5080 r5:859cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4100 INFO: task kworker/0:641:6348 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 r5:859ce000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a38f8c r4:85a38c00 r10:00000000 r9:85226d00 r8:8027ed34 r7:ecd1de60 r6:851f5100 r5:859ce000 Workqueue: events bpf_prog_free_deferred r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859cec00 r4:00000000 r4:00000000 r5:85a3878c r4:85a38400 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f43c0 INFO: task kworker/0:643:6352 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e808c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:6354 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:6354 tgid:6354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd65d84 r8:00000002 r7:60000113 r6:ecd65d8c r5:859f8000 r4:859f8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85226e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4600 INFO: task kworker/0:644:6354 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e808c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85a3a38c r4:85a3a000 r4:85226e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859fa400 r4:00000000 r4:00000000 r5:85a3938c r4:85a39000 r4:85226f00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e8a36000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:6359 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd79d84 r8:00000002 r7:60000113 r6:ecd79d8c r5:859fbc00 r4:859fbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd79e08 r9:83018005 r8:859fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r4:85226f80 Exception stack(0xecd79fb0 to 0xecd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4680 INFO: task kworker/0:647:6359 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e90a5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: e90a5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:6364 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:6364 tgid:6364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd8dd84 r8:00000002 r7:60000113 r6:ecd8dd8c r5:859fc800 r4:859fc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd8de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb21000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a39f8c r4:85a39c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a39f8c r4:85157080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fc800 r8:851570ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85157080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:859fe000 r8:8515712c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e9426000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:6367 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:6367 tgid:6367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd91d84 r8:00000002 r7:60000013 r6:ecd91d8c r5:859fec00 r4:859fec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd91e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb917000 r10:61c88647 r9:859fec00 r8:851571ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:652:6369 blocked for more than 478 seconds. r4:859fb000 r4:00000000 r9:83018005 r8:859fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r4:85157200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:6372 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:6372 tgid:6372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecda5d84 r8:00000002 r7:60000113 r6:ecda5d8c r5:85a00c00 r4:85a00c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a00c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203c40 r7:dddced40 r6:83018000 r5:85a3af8c r4:85157280 Exception stack(0xecda5fb0 to 0xecda5ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecdadfb0 to 0xecdadff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: ea09b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6375 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6375 tgid:6375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdb1d84 r8:00000002 r7:60000113 r6:ecdb1d8c r5:85a00000 r4:85a00000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a00000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:85a3b78c r4:85a3b400 r10:00000000 r9:85157380 r8:8027ed34 r7:ecc5de60 r6:851f5780 r5:85a00000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r5:00001000 r4:ec775000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3bf8c r4:85a3bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3bf8c r4:85157400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d6c00 r8:8515742c r7:82804d40 r6:dddced40 r5:dddced60 r4:85157400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85157400 r8:8027ed34 r7:ecc5de60 r6:85157480 r5:859d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85145140 r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:657:6380 blocked for more than 478 seconds. r5:859d6000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a3c38c r4:85157500 Exception stack(0xecdb9fb0 to 0xecdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85145580 INFO: task kworker/0:657:6380 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: ea656000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdbdd84 r8:00000002 r7:60000013 r6:ecdbdd8c r5:859d5400 r4:859d5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85145ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca09000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85157600 Exception stack(0xecdbdfb0 to 0xecdbdff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:6384 blocked for more than 478 seconds. [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 800d0013 ffffffff r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc5fb0 to 0xecdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851455c0 INFO: task kworker/0:660:6386 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: eac0b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:6387 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:6387 tgid:6387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84930c00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85157900 Exception stack(0xecdc9fb0 to 0xecdc9ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:6390 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:6390 tgid:6390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd55d84 r8:00000002 r7:60000013 r6:ecd55d8c r5:84932400 r4:84932400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84932400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd55e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:6392 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:6392 tgid:6392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:84933000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85157b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85157c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85157c00 r8:8027ed34 r7:ecdd1e60 r6:85157c80 r5:84931800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85145ec0 INFO: task kworker/0:664:6395 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: eb4dd000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecdcdfb0 to 0xecdcdff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:6400 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecde1d84 r8:00000002 r7:60000013 r6:ecde1d8c r5:85a03c00 r4:85a03c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a03c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3e78c r4:85a3e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85157e80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ecae5000 r10:61c88647 r9:85a04800 r8:85157f2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:6404 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:6404 tgid:6404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecde9d84 r8:00000002 r7:60000013 r6:ecde9d8c r5:85a05400 r4:85a05400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a05400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0c00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a05400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc73000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3fb8c r4:85a3f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3fb8c r4:85157f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a05400 r8:85157fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85157f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85157f80 r8:8027ed34 r7:ecddde60 r6:851f5980 r5:85a05400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecde9fb0 to 0xecde9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f0440 INFO: task kworker/0:669:6404 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xecdedfb0 to 0xecdedff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:961:6408 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:961 state:D stack:0 pid:6408 tgid:6408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdd5d84 r8:00000002 r7:60000113 r6:ecdd5d8c r5:85a06c00 r4:85a06c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a06c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851425c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc09000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85995f8c r4:85995c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85995f8c r4:851f5a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a06c00 r8:851f5aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f5a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5a80 r8:8027ed34 r7:eccf1e60 r6:851f5b00 r5:85a06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd5fb0 to 0xecdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85142fc0 INFO: task kworker/1:961:6408 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xecdf1fb0 to 0xecdf1ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:963:6414 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:963 state:D stack:0 pid:6414 tgid:6414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdf5d84 r8:00000002 r7:60000013 r6:ecdf5d8c r5:859cd400 r4:859cd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859cd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a8a00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed227000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599738c r4:85997000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599738c r4:851f5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859cd400 r8:851f5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5c80 r8:8027ed34 r7:ecdd5e60 r6:851f5d00 r5:859cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf5fb0 to 0xecdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85142500 INFO: task kworker/1:963:6414 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:6416 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:6416 tgid:6416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf9e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:964:6420 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:964 state:D stack:0 pid:6420 tgid:6420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece01d84 r8:00000002 r7:60000113 r6:ece01d8c r5:84936c00 r4:84936c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84936c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84936c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd67000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abd38c r4:85abd000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85abd38c r4:851f5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84936c00 r8:851f5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5d80 r8:8027ed34 r7:ecdf5e60 r6:850ef280 r5:84936c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a4878c r4:850ef300 Exception stack(0xece05fb0 to 0xece05ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:6424 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:6424 tgid:6424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece09d84 r8:00000002 r7:60000113 r6:ece09d8c r5:85a50000 r4:85a50000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a50000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece09e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a50000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a48f8c r4:85a48c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a48f8c r4:850ef400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a50000 r8:850ef42c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) Not tainted 6.15.0-syzkaller #0 r5:85a50c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a48b8c r4:85a48800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 900b0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:676:6428 blocked for more than 478 seconds. r5:85a51800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a51800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4ab8c r4:85a4a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4ab8c r4:850ef600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a51800 r8:850ef62c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef600 r8:8027ed34 r7:ece09e60 r6:850ef680 r5:85a51800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece0dfb0 to 0xece0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f60c0 INFO: task kworker/0:676:6428 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 7f5fa000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 900b0013 ffffffff r5:900b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/0:677:6429 blocked for more than 478 seconds. r5:85a52400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1d40 task:kworker/0:678 state:D stack:0 pid:6430 tgid:6430 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:ece1dd84 r8:00000002 r7:60000013 r6:ece1dd8c r5:85a53000 r4:85a53000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a53000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a53000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4978c r4:85a49400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4978c r4:850ef800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a53000 r8:850ef82c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef800 r8:8027ed34 r7:ece0de60 r6:850ef880 r5:85a53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece1dfb0 to 0xece1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6300 INFO: task kworker/0:678:6430 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 7fcbc000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 900b0013 ffffffff r5:900b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85a53c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a49b8c r4:85a49800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a49b8c r4:850ef900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a53c00 r8:850ef92c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef900 r8:8027ed34 r7:ece0de60 r6:850ef980 r5:85a53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece19fb0 to 0xece19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6500 INFO: task kworker/0:679:6432 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8008f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1d40 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85a54800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece29e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850efa00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6700 INFO: task kworker/0:680:6435 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8008f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:6437 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece35d84 r8:00000002 r7:60000013 r6:ece35d8c r5:85a55400 r4:85a55400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a55400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece35e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6880 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a55400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece31000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4a38c r4:85a4a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4a38c r4:850efb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a55400 r8:850efb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efb00 r8:8027ed34 r7:ece0de60 r6:850efb80 r5:85a55400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece35fb0 to 0xece35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f68c0 INFO: task kworker/0:681:6437 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8051a000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:6439 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:6439 tgid:6439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece49d84 r8:00000002 r7:60000013 r6:ece49d8c r5:85a56000 r4:85a56000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a56000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f69c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a56000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4a78c r4:85a4a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4a78c r4:850efc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a56000 r8:850efc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efc00 r8:8027ed34 r7:ece0de60 r6:850efc80 r5:85a56000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6a00 INFO: task kworker/0:682:6439 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8051a000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:6440 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece21d84 r8:00000002 r7:60000013 r6:ece21d8c r5:85a56c00 r4:85a56c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a56c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece59000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4b38c r4:85a4b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4b38c r4:850efd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a56c00 r8:850efd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efd00 r8:8027ed34 r7:ece0de60 r6:850efd80 r5:85a56c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece21fb0 to 0xece21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6a00 INFO: task kworker/0:683:6440 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 809d8000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:6443 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:6443 tgid:6443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece51d84 r8:00000002 r7:60000013 r6:ece51d8c r5:85110000 r4:85110000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6dc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85110000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece53000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4af8c r4:85a4ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4af8c r4:850efe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110000 r8:850efe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efe00 r8:8027ed34 r7:ece21e60 r6:850efe80 r5:85110000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece51fb0 to 0xece51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6d80 INFO: task kworker/0:684:6443 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 809d8000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:6445 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece5dd84 r8:00000002 r7:60000113 r6:ece5dd8c r5:85110c00 r4:85110c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e0c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85110c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece67000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4b78c r4:85a4b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4b78c r4:850eff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110c00 r8:850eff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850eff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eff00 r8:8027ed34 r7:ece21e60 r6:850eff80 r5:85110c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece5dfb0 to 0xece5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6d80 INFO: task kworker/0:685:6445 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 80e9d000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:6448 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece65d84 r8:00000002 r7:60000113 r6:ece65d8c r5:85111800 r4:85111800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85111800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab038c r4:85ab0000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab038c r4:8531a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85111800 r8:8531a02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a000 r8:8027ed34 r7:ece5de60 r6:8531a080 r5:85111800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e1c0 INFO: task kworker/0:686:6448 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 80e9d000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:6449 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:6449 tgid:6449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece71d84 r8:00000002 r7:60000013 r6:ece71d8c r5:85112400 r4:85112400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85112400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece6d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4bb8c r4:85a4b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4bb8c r4:8531a100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85112400 r8:8531a12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a100 r8:8027ed34 r7:ece65e60 r6:8531a180 r5:85112400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e1c0 INFO: task kworker/0:687:6449 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:6451 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece79d84 r8:00000002 r7:60000013 r6:ece79d8c r5:85113000 r4:85113000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85113000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85113000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4bf8c r4:85a4bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4bf8c r4:8531a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85113000 r8:8531a22c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8531a200 r8:8027ed34 r7:ece65e60 r6:8531a280 r5:85113000 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85113c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e6c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:6456 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:6456 tgid:6456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:85114800 r4:85114800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85114800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85114800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab0b8c r4:85ab0800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab0b8c r4:8531a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85114800 r8:8531a42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a400 r8:8027ed34 r7:ece7de60 r6:8531a480 r5:85114800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e680 INFO: task kworker/0:690:6456 is blocked on a mutex likely owned by task kworker/1:101:3662. r4:00000000 r4:82ac11e4 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85115400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85115400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece85e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ea80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85115400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab138c r4:85ab1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab138c r4:8531a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85115400 r8:8531a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a500 r8:8027ed34 r7:ece81e60 r6:8531a580 r5:85115400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece85fb0 to 0xece85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e7c0 INFO: task kworker/0:691:6457 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:6459 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85116000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85ab0f8c r4:85ab0c00 r10:00000000 r9:8531a600 r8:8027ed34 r7:ece85e60 r6:8531a680 r5:85116000 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85116c00 r5:85116c00 r4:829187f0 r4:00000000 r9:83018005 r8:85116c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r4:8531a700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: 81c38000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece91d84 r8:00000002 r7:60000113 r6:ece91d8c r5:85a58000 r4:85a58000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a58000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ed80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a58000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec663000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab1b8c r4:85ab1800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab1b8c r4:8531a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a58000 r8:8531a82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a800 r8:8027ed34 r7:ece8de60 r6:8531a880 r5:85a58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece91fb0 to 0xece91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531ec80 INFO: task kworker/0:694:6464 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 81fbc000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 r4:e0419dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85a58c00 r4:829187f0 r4:00000000 r9:83018005 r8:85a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:61c88647 r9:85a58c00 r8:8531a92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a59800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ff040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a59800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab1f8c r4:85ab1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab1f8c r4:8531aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a59800 r8:8531aa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531aa00 r8:8027ed34 r7:ece95e60 r6:8531aa80 r5:85a59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece9dfb0 to 0xece9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531ec80 INFO: task kworker/0:696:6466 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 823a0000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85a5b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ff5c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84af1d40 Workqueue: events bpf_prog_free_deferred r5:85a5c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ab278c r4:8531ac00 r10:61c88647 r9:85a5c800 r8:8531ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531ac00 r8:8027ed34 r7:ecea1e60 r6:8531ac80 r5:85a5c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ff380 INFO: task kworker/0:698:6470 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 82882000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 INFO: task kworker/0:699:6474 blocked for more than 478 seconds. r5:85a5d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r5:00001000 r4:ee065000 r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1d40 task:kworker/0:700 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8531ae00 r8:8027ed34 r7:eceade60 r6:8531ae80 r5:85a5bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ff680 INFO: task kworker/0:700:6476 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 83126000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:701 state:D stack:0 pid:6478 tgid:6478 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:6480 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:6480 tgid:6480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceb9d84 r8:00000002 r7:60000013 r6:eceb9d8c r5:852c8000 r4:852c8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ffe80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab3b8c r4:85ab3800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab3b8c r4:85458000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8000 r8:8545802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458000 r8:8027ed34 r7:eceb5e60 r6:85458080 r5:852c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853ffa80 r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecebdfb0 to 0xecebdff8) task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:6484 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:6484 tgid:6484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecec1d84 r8:00000002 r7:60000113 r6:ecec1d8c r5:852c8c00 r4:852c8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab3f8c r4:85ab3c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab3f8c r4:85458200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8c00 r8:8545822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458200 r8:8027ed34 r7:ecebde60 r6:85458280 r5:852c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853e7100 Call trace: 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:852cc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e76c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd13000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abcb8c r4:85abc800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abcb8c r4:85458400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cc800 r8:8545842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458400 r8:8027ed34 r7:ecec5e60 r6:85458480 r5:852cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec9fb0 to 0xecec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e7400 INFO: task kworker/0:706:6488 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 83ad6000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ececdd84 r8:00000002 r7:60000013 r6:ececdd8c r5:852cd400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85458500 r8:8027ed34 r7:ecec9e60 r6:85458580 r5:852cd400 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0419fb0 to 0xe0419ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf1c0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abdf8c r4:85abdc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abdf8c r4:85458600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cb000 r8:8545862c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458600 r8:8027ed34 r7:ececde60 r6:85458680 r5:852cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e7100 INFO: task kworker/0:708:6492 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8428f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:709:6493 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:709 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eceddd84 r8:00000002 r7:60000013 r6:eceddd8c r5:852cec00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:852cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abdb8c r4:85abd800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abdb8c r4:85458800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cec00 r8:8545882c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458800 r8:8027ed34 r7:eced1e60 r6:85458880 r5:852cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e7cc0 INFO: task kworker/0:710:6496 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8446e000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:965 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecea5d84 r8:00000002 r7:60000113 r6:ecea5d8c r5:85a08c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecef1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abe78c r4:85abe400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abe78c r4:85458900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a08c00 r8:8545892c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458900 r8:8027ed34 r7:eced1e60 r6:851f5f00 r5:85a08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea5fb0 to 0xecea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf180 INFO: task kworker/0:711:6500 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8446e000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0419dc0 r5:00001000 r4:ee065000 r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:712:6501 blocked for more than 479 seconds. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceeb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abe38c r4:85abe000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abe38c r4:85458980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0a400 r8:854589ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458980 r8:8027ed34 r7:ecea5e60 r6:851f5f80 r5:85a0a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee9fb0 to 0xecee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf000 INFO: task kworker/0:712:6501 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0419d20 to 0xe0419d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:6505 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:6505 tgid:6505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf09d84 r8:00000002 r7:60000113 r6:ecf09d8c r5:85a0c800 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecf09fb0 to 0xecf09ff8) r4:853cf000 INFO: task kworker/0:713:6505 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 84cbe000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:714:6506 blocked for more than 479 seconds. r4:85a0d400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r10:61c88647 r9:85a0d400 r8:85458aac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r4:00000000 r5:8487af8c r4:8487ac00 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf17000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abf38c r4:85abf000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abf38c r4:85458b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0bc00 r8:85458b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458b00 r8:8027ed34 r7:ecf0de60 r6:8543e100 r5:85a0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf21fb0 to 0xecf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf780 INFO: task kworker/0:715:6509 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 84f2f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8487af8c r4:8487ac00 9fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecf25d84 r8:00000002 r7:60000113 r6:ecf25d8c r5:85a0e000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abfb8c r4:85abf800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abfb8c r4:85458b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0e000 r8:85458bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458b80 r8:8027ed34 r7:ecf21e60 r6:8543e180 r5:85a0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf780 INFO: task kworker/0:716:6510 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800b0013 r4:80239bd0 r4:e0419dc0 r5:8487af8c r4:8487ac00 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecf29fb0 to 0xecf29ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8527a000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:6514 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf45d84 r8:00000002 r7:60000113 r6:ecf45d8c r5:859fd400 r4:859fd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf45e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cfd00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf4b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac438c r4:85ac4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac438c r4:85458c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fd400 r8:85458cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458c80 r8:8027ed34 r7:ecf25e60 r6:8543e280 r5:859fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cfa40 INFO: task kworker/0:718:6514 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 855be000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85a10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r10:61c88647 r9:85a10c00 r8:85458d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84af1d40 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cfe80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a11800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf51000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac478c r4:85ac4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac478c r4:85458d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r5:00001000 r4:ee065000 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:6520 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf69d84 r8:00000002 r7:60000013 r6:ecf69d8c r5:85a13000 r4:85a13000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a13000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ac6b8c r4:85458e00 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:8487af8c r4:8487ac00 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:6521 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf6dd84 r8:00000002 r7:60000113 r6:ecf6dd8c r5:85a10000 r4:85a10000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a10000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf6de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a10000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac4b8c r4:85ac4800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac4b8c r4:85458e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a10000 r8:85458eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a15400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a15400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf85e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a15400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf75000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac4f8c r4:85ac4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac4f8c r4:85458f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a15400 r8:85458f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458f00 r8:8027ed34 r7:ecf69e60 r6:8543e500 r5:85a15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf85fb0 to 0xecf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 85e52000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 r5:8487af8c r4:8487ac00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a12400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ac538c r4:85458f80 Exception stack(0xecf89fb0 to 0xecf89ff8) task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8609f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 Not tainted 6.15.0-syzkaller #0 r5:85a14800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563040 r10:61c88647 r9:85a14800 r8:8555102c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r4:00000000 r5:8487af8c r4:8487ac00 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:6529 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:6529 tgid:6529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfadd84 r8:00000002 r7:60000013 r6:ecfadd8c r5:85a13c00 r4:85a13c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a13c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855631c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac5b8c r4:85ac5800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac5b8c r4:85551080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac5f8c r4:85ac5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac5f8c r4:85551100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0b000 r8:8555112c r7:82804d40 r6:dddced40 r5:dddced60 r4:85551100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85551100 r8:8027ed34 r7:ecf69e60 r6:8543e700 r5:85a0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb9fb0 to 0xecfb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85563180 INFO: task kworker/0:727:6531 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 867c2000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:8487af8c r4:8487ac00 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 r4:85551180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 86af7000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 r5:8487af8c r4:8487ac00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:729 state:D stack:0 pid:6536 tgid:6536 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:85ae8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 Not tainted 6.15.0-syzkaller #0 r5:85ae9800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac6f8c r4:85ac6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac6f8c r4:85551280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae9800 r8:855512ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85551280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85551280 r8:8027ed34 r7:ecf69e60 r6:8543e880 r5:85ae9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfe5fb0 to 0xecfe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85563540 INFO: task kworker/0:730:6537 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 86d28000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ac738c r4:85551300 Exception stack(0xecff1fb0 to 0xecff1ff8) Call trace: 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:6542 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:6542 tgid:6542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecffdd84 r8:00000002 r7:60000013 r6:ecffdd8c r5:85ae8000 r4:85ae8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecffde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff9000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecffdfb0 to 0xecffdff8) task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546ed00 r7:dddced40 r6:83018000 r5:85ac838c r4:85551400 r4:00000001 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r5:00001000 r4:ee065000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:6545 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:6545 tgid:6545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf05d84 r8:00000002 r7:60000113 r6:ecf05d8c r5:85a5e000 r4:85a5e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a5e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed007000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac7b8c r4:85ac7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac7b8c r4:85551480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a5e000 r8:855514ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85551480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85551480 r8:8027ed34 r7:ed011e60 r6:85551500 r5:85a5e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85563a80 INFO: task kworker/0:734:6545 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 876e7000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5a400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:6550 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:6550 tgid:6550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed01dd84 r8:00000002 r7:60000013 r6:ed01dd8c r5:852cbc00 r4:852cbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852cbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed01de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)