INFO: task kworker/1:1:88 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:1 state:D stack:0 pid:88 tgid:88 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:83b54800
r4:83b54800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b54800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83b54800 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df965000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff078c r4:84ff0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ff078c r4:8394b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b54800 r8:8394b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8394b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8394b680 r8:80287e08 r7:df879e60 r6:8394b700 r5:83b54800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf98dfb0 to 0xdf98dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8394ea00
INFO: task kworker/1:1:88 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:2:3111 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:2 state:D stack:0 pid:3111 tgid:3111 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9c5d84 r8:00000002 r7:60000113 r6:df9c5d8c r5:83b50c00
r4:83b50c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b50c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e01e40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b50c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e4893000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8511378c r4:85113400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8511378c r4:84c30000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b50c00 r8:84c3002c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30000 r8:80287e08 r7:df845e60 r6:84c30300 r5:83b50c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9c5fb0 to 0xdf9c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:83e71e40
INFO: task kworker/0:2:3111 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:4:3114 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:4 state:D stack:0 pid:3114 tgid:3114 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83b52400
r4:83b52400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b52400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b52400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbfb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6538c r4:84e65000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6538c r4:84c30180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b52400 r8:84c301ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30180 r8:80287e08 r7:df9c5e60 r6:84c30380 r5:83b52400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d9fb0 to 0xdf9d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8454e600
INFO: task kworker/0:4:3114 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/1:3:3115 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:3 state:D stack:0 pid:3115 tgid:3115 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9cdd84 r8:00000002 r7:60000113 r6:df9cdd8c r5:841ca400
r4:841ca400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841ca400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a2c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:841ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebdb8c r4:84ebd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebdb8c r4:8454f980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841ca400 r8:8454f9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8454f980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8454f980 r8:80287e08 r7:df98de60 r6:8454fd00 r5:841ca400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9cdfb0 to 0xdf9cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8457b5c0
INFO: task kworker/1:3:3115 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:5:3118 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:5 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9e5d84 r8:00000002 r7:60000113 r6:df9e5d8c r5:841c8000
r4:841c8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841c8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa09c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85013b8c r4:85013800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85013b8c r4:84c30200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841c8000 r8:84c3022c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30200 r8:80287e08 r7:df9c5e60 r6:8454fd80 r5:841c8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9e5fb0 to 0xdf9e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84c11140
INFO: task kworker/0:5:3118 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:6:3119 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:6 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:841c9800
r4:841c9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841c9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d080
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df991000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c378c r4:850c3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:850c378c r4:84c30480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841c9800 r8:84c304ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30480 r8:80287e08 r7:df9c5e60 r6:8454fe00 r5:841c9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9edfb0 to 0xdf9edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84c27580
INFO: task kworker/0:6:3119 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:7:3123 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:7 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9fdd84 r8:00000002 r7:60000113 r6:df9fdd8c r5:841c8c00
r4:841c8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841c8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09d40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514938c r4:85149000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514938c r4:84c30580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841c8c00 r8:84c305ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30580 r8:80287e08 r7:df9c5e60 r6:8454f080 r5:841c8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9fdfb0 to 0xdf9fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84566f00
INFO: task kworker/0:7:3123 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:8:3124 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:841cec00
r4:841cec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841cec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301f40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df99d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85195b8c r4:85195800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85195b8c r4:84c30600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841cec00 r8:84c3062c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30600 r8:80287e08 r7:df9fde60 r6:843eba80 r5:841cec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa05fb0 to 0xdfa05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84534540
INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:9:3127 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:9 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:841cd400
r4:841cd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841cd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e121c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffc1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514a38c r4:8514a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514a38c r4:84c30680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841cd400 r8:84c306ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30680 r8:80287e08 r7:df9fde60 r6:843ebb00 r5:841cd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa11fb0 to 0xdfa11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845343c0
INFO: task kworker/0:9:3127 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/0:10:3130 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:10 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa31d84 r8:00000002 r7:60000113 r6:dfa31d8c r5:83865400
r4:83865400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83865400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa31e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83865400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa79000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514af8c r4:8514ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514af8c r4:84c30700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83865400 r8:84c3072c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30700 r8:80287e08 r7:dfa11e60 r6:84727000 r5:83865400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa31fb0 to 0xdfa31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8410ea40
INFO: task kworker/0:10:3130 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:11:3131 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000013 r6:dfa35d8c r5:83861800
r4:83861800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83861800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e180
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83861800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514bf8c r4:8514bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514bf8c r4:84c30400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83861800 r8:84c3042c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30400 r8:80287e08 r7:dfa31e60 r6:84727200 r5:83861800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa35fb0 to 0xdfa35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8457ae00
INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:12:3133 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:12 state:D stack:0 pid:3133 tgid:3133 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:83860c00
r4:83860c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83860c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb1c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b2f8c r4:853b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:853b2f8c r4:84c30800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83860c00 r8:84c3082c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30800 r8:80287e08 r7:dfa35e60 r6:8394bb80 r5:83860c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa49fb0 to 0xdfa49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574100
INFO: task kworker/0:12:3133 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:13:3134 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:13 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa4dd84 r8:00000002 r7:60000113 r6:dfa4dd8c r5:83863c00
r4:83863c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83863c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa4de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536a900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb253000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466838c r4:84668000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466838c r4:84c30880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83863c00 r8:84c308ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30880 r8:80287e08 r7:dfa49e60 r6:8394bb00 r5:83863c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa4dfb0 to 0xdfa4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574100
INFO: task kworker/0:13:3134 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:14:3137 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:14 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83866000
r4:83866000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83866000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83866000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8913000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466938c r4:84669000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466938c r4:84c30780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83866000 r8:84c307ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30780 r8:80287e08 r7:dfa4de60 r6:83348880 r5:83866000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa5dfb0 to 0xdfa5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845742c0
INFO: task kworker/0:14:3137 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:15:3140 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:15 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:83866c00
r4:83866c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83866c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e1a40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83866c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466978c r4:84669400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466978c r4:84c30980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83866c00 r8:84c309ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30980 r8:80287e08 r7:dfa5de60 r6:83348800 r5:83866c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa75fb0 to 0xdfa75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574240
INFO: task kworker/0:15:3140 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:16:3141 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:16 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83863000
r4:83863000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83863000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83863000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85496f8c r4:85496c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85496f8c r4:84c30a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83863000 r8:84c30aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30a80 r8:80287e08 r7:dfa75e60 r6:83353580 r5:83863000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa81fb0 to 0xdfa81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574600
INFO: task kworker/0:16:3141 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:17:3143 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:17 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa89d84 r8:00000002 r7:60000113 r6:dfa89d8c r5:8425e000
r4:8425e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8425e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85467d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8425e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaad3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85339b8c r4:85339800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85339b8c r4:84c30900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8425e000 r8:84c3092c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30900 r8:80287e08 r7:dfa81e60 r6:83353500 r5:8425e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa89fb0 to 0xdfa89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574540
INFO: task kworker/0:17:3143 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:18:3144 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:18 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8425bc00
r4:8425bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8425bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8425bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533af8c r4:8533ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533af8c r4:84c30b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8425bc00 r8:84c30b2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30b00 r8:80287e08 r7:dfa89e60 r6:843cef00 r5:8425bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa91fb0 to 0xdfa91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574540
INFO: task kworker/0:18:3144 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93e21000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:19:3146 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:19 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:8425ec00
r4:8425ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8425ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aec80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8425ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb77f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d7f8c r4:854d7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d7f8c r4:84c30c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8425ec00 r8:84c30c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30c00 r8:80287e08 r7:dfa91e60 r6:843cee00 r5:8425ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa1fb0 to 0xdfaa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845746c0
INFO: task kworker/0:19:3146 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 945ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:20:3148 blocked for more than 450 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:20 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:83b4d400
r4:83b4d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b4d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb5b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466a78c r4:8466a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466a78c r4:84c30b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b4d400 r8:84c30bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30b80 r8:80287e08 r7:dfaa1e60 r6:84c30100 r5:83b4d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf9d1fb0 to 0xdf9d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574780
INFO: task kworker/0:20:3148 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 945ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:21:3151 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:21 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfaa5d84 r8:00000002 r7:60000013 r6:dfaa5d8c r5:83b56000
r4:83b56000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83b56000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83b56000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa97000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466ab8c r4:8466a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466ab8c r4:84c30c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83b56000 r8:84c30cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30c80 r8:80287e08 r7:dfaa1e60 r6:84c30d00 r5:83b56000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfaa5fb0 to 0xdfaa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574a00
INFO: task kworker/0:21:3151 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 945ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:22:3152 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:22 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83393000
r4:83393000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83393000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80e80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:83393000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560bb8c r4:8560b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8560bb8c r4:84c30d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83393000 r8:84c30dac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84c30d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84c30d80 r8:80287e08 r7:dfaa1e60 r6:84c30a00 r5:83393000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdfa19fb0 to 0xdfa19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574a00
INFO: task kworker/0:22:3152 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:125:3554 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:125 state:D stack:0 pid:3554 tgid:3554 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0015d84 r8:00000002 r7:60000113 r6:e0015d8c r5:84d99800
r4:84d99800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d99800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0015e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d99800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfec5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e53b8c r4:84e53800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e53b8c r4:84e78280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d99800 r8:84e782ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78280 r8:80287e08 r7:dffe1e60 r6:84e78380 r5:84d99800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0015fb0 to 0xe0015ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e7b500
INFO: task kworker/0:125:3554 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:109:3572 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:109 state:D stack:0 pid:3572 tgid:3572 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e005dd84 r8:00000002 r7:60000113 r6:e005dd8c r5:84ce1800
r4:84ce1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e005de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9ac00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ce1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebcb8c r4:84ebc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebcb8c r4:84e06280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce1800 r8:84e062ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e06280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e06280 r8:80287e08 r7:e0045e60 r6:84e78800 r5:84ce1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe005dfb0 to 0xe005dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e08280
INFO: task kworker/1:109:3572 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:111:3576 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:111 state:D stack:0 pid:3576 tgid:3576 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dffe9d84 r8:00000002 r7:60000113 r6:dffe9d8c r5:84d8bc00
r4:84d8bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffe9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e08a40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebc38c r4:84ebc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebc38c r4:84e06200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8bc00 r8:84e0622c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e06200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e06200 r8:80287e08 r7:e005de60 r6:84e06380 r5:84d8bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe9fb0 to 0xdffe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e08500
INFO: task kworker/1:111:3576 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:126:3579 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:126 state:D stack:0 pid:3579 tgid:3579 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0071d84 r8:00000002 r7:60000113 r6:e0071d8c r5:84d8e000
r4:84d8e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0071e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb51000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:847d6f8c r4:847d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:847d6f8c r4:84e78900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8e000 r8:84e7892c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78900 r8:80287e08 r7:e0015e60 r6:84e06180 r5:84d8e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0071fb0 to 0xe0071ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfa100
INFO: task kworker/0:126:3579 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:127:3580 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:127 state:D stack:0 pid:3580 tgid:3580 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0075d84 r8:00000002 r7:60000013 r6:e0075d8c r5:84d8a400
r4:84d8a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0075e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa2c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df97f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e53f8c r4:84e53c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e53f8c r4:84e78a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8a400 r8:84e78a2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78a00 r8:80287e08 r7:e0071e60 r6:84e06300 r5:84d8a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0075fb0 to 0xe0075ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfa100
INFO: task kworker/0:127:3580 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:128:3583 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:128 state:D stack:0 pid:3583 tgid:3583 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0081d84 r8:00000002 r7:60000113 r6:e0081d8c r5:84d8ec00
r4:84d8ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0081e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb6d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6438c r4:84e64000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6438c r4:84e78a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8ec00 r8:84e78aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78a80 r8:80287e08 r7:df9d9e60 r6:84e06400 r5:84d8ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0081fb0 to 0xe0081ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfa5c0
INFO: task kworker/0:128:3583 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:129:3586 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:129 state:D stack:0 pid:3586 tgid:3586 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0069d84 r8:00000002 r7:60000113 r6:e0069d8c r5:84ce2400
r4:84ce2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0069e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ce2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6478c r4:84e64400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6478c r4:84e78c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce2400 r8:84e78cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78c80 r8:80287e08 r7:df9d9e60 r6:84e78980 r5:84ce2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0069fb0 to 0xe0069ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfa480
INFO: task kworker/0:129:3586 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:130:3589 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:130 state:D stack:0 pid:3589 tgid:3589 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0085d84 r8:00000002 r7:60000013 r6:e0085d8c r5:84ce3c00
r4:84ce3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0085e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ce3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e64b8c r4:84e64800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e64b8c r4:84e78b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce3c00 r8:84e78bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78b80 r8:80287e08 r7:df9d9e60 r6:84e78b00 r5:84ce3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0085fb0 to 0xe0085ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfaac0
INFO: task kworker/0:130:3589 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:131:3590 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:131 state:D stack:0 pid:3590 tgid:3590 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:dffd9d84 r8:00000002 r7:60000113 r6:dffd9d8c r5:84ce4800
r4:84ce4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dffd9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa8c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ce4800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfbd9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e64f8c r4:84e64c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e64f8c r4:84e78d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce4800 r8:84e78d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78d00 r8:80287e08 r7:df9d9e60 r6:84e78c00 r5:84ce4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffd9fb0 to 0xdffd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfaac0
INFO: task kworker/0:131:3590 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:132:3593 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:132 state:D stack:0 pid:3593 tgid:3593 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0095d84 r8:00000002 r7:60000013 r6:e0095d8c r5:84ce5400
r4:84ce5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0095e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfac00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ce5400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc27000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6578c r4:84e65400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6578c r4:84e78d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce5400 r8:84e78dac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78d80 r8:80287e08 r7:df9d9e60 r6:84e78f00 r5:84ce5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0095fb0 to 0xe0095ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfa980
INFO: task kworker/0:132:3593 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:133:3594 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:133 state:D stack:0 pid:3594 tgid:3594 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e008dd84 r8:00000002 r7:60000013 r6:e008dd8c r5:84ce6000
r4:84ce6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e008de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8454e500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ce6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e65f8c r4:84e65c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e65f8c r4:84e78e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce6000 r8:84e78e2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e78e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e78e00 r8:80287e08 r7:e0095e60 r6:84e78e80 r5:84ce6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe008dfb0 to 0xe008dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfa980
INFO: task kworker/0:133:3594 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:134:3596 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:134 state:D stack:0 pid:3596 tgid:3596 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0099d84 r8:00000002 r7:60000113 r6:e0099d8c r5:84ce6c00
r4:84ce6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ce6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0099e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfae00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ce6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e65b8c r4:84e65800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e65b8c r4:84e11100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce6c00 r8:84e1112c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11100 r8:80287e08 r7:e008de60 r6:84e11000 r5:84ce6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0099fb0 to 0xe0099ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfabc0
INFO: task kworker/0:134:3596 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:135:3598 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:135 state:D stack:0 pid:3598 tgid:3598 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00a1d84 r8:00000002 r7:60000013 r6:e00a1d8c r5:84d94800
r4:84d94800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d94800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e7b940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d94800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc83000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6638c r4:84e66000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6638c r4:84e11080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d94800 r8:84e110ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11080 r8:80287e08 r7:e008de60 r6:84e11200 r5:84d94800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a1fb0 to 0xe00a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e7bdc0
INFO: task kworker/0:135:3598 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:136:3600 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:136 state:D stack:0 pid:3600 tgid:3600 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84d8c800
r4:84d8c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74280
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e66f8c r4:84e66c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e66f8c r4:84e11280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8c800 r8:84e112ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11280 r8:80287e08 r7:e00a1e60 r6:84e06480 r5:84d8c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00a5fb0 to 0xe00a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e7bdc0
INFO: task kworker/0:136:3600 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:137:3603 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:137 state:D stack:0 pid:3603 tgid:3603 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e009dd84 r8:00000002 r7:60000013 r6:e009dd8c r5:84d8b000
r4:84d8b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e009de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d8b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6678c r4:84e66400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6678c r4:84e11180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8b000 r8:84e111ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11180 r8:80287e08 r7:e00a5e60 r6:84e06500 r5:84d8b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe009dfb0 to 0xe009dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74100
INFO: task kworker/0:137:3603 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:138:3606 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:138 state:D stack:0 pid:3606 tgid:3606 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00b5d84 r8:00000002 r7:60000013 r6:e00b5d8c r5:84d88c00
r4:84d88c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d88c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfda7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e66b8c r4:84e66800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e66b8c r4:84e11400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d88c00 r8:84e1142c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11400 r8:80287e08 r7:e00a5e60 r6:84e06680 r5:84d88c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00b5fb0 to 0xe00b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e741c0
INFO: task kworker/0:138:3606 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:139:3608 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:139 state:D stack:0 pid:3608 tgid:3608 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00bdd84 r8:00000002 r7:60000113 r6:e00bdd8c r5:84d8d400
r4:84d8d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d8d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00bde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfded000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6738c r4:84e67000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6738c r4:84e11380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d8d400 r8:84e113ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11380 r8:80287e08 r7:e00a5e60 r6:84e06580 r5:84d8d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00bdfb0 to 0xe00bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e742c0
INFO: task kworker/0:139:3608 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:140:3609 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:140 state:D stack:0 pid:3609 tgid:3609 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00c1d84 r8:00000002 r7:60000113 r6:e00c1d8c r5:84d88000
r4:84d88000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d88000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d88000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e67f8c r4:84e67c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e67f8c r4:84e11500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d88000 r8:84e1152c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11500 r8:80287e08 r7:e00bde60 r6:84e06600 r5:84d88000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00c1fb0 to 0xe00c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74440
INFO: task kworker/0:140:3609 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:141:3610 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:141 state:D stack:0 pid:3610 tgid:3610 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00c5d84 r8:00000002 r7:60000113 r6:e00c5d8c r5:84f4bc00
r4:84f4bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f4bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84f4bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe09000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e6778c r4:84e67400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e6778c r4:84e11580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f4bc00 r8:84e115ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11580 r8:80287e08 r7:e00c1e60 r6:84e06700 r5:84f4bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00c5fb0 to 0xe00c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74440
INFO: task kworker/0:141:3610 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:112:3612 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:112 state:D stack:0 pid:3612 tgid:3612 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:841f3000
r4:841f3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:841f3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9a240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:841f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0527000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebc78c r4:84ebc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebc78c r4:84e06780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:841f3000 r8:84e067ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e06780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e06780 r8:80287e08 r7:e005de60 r6:84e06800 r5:841f3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00cdfb0 to 0xe00cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f813c0
INFO: task kworker/1:112:3612 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:142:3613 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:142 state:D stack:0 pid:3613 tgid:3613 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00d1d84 r8:00000002 r7:60000013 r6:e00d1d8c r5:84ca0000
r4:84ca0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe33000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e67b8c r4:84e67800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e67b8c r4:84e11480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca0000 r8:84e114ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11480 r8:80287e08 r7:e00c1e60 r6:84e06880 r5:84ca0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d1fb0 to 0xe00d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74540
INFO: task kworker/0:142:3613 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:143:3616 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:143 state:D stack:0 pid:3616 tgid:3616 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00d5d84 r8:00000002 r7:60000113 r6:e00d5d8c r5:84ca0c00
r4:84ca0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfea9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e70b8c r4:84e70800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e70b8c r4:84e11300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca0c00 r8:84e1132c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11300 r8:80287e08 r7:e00c1e60 r6:84e06900 r5:84ca0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d5fb0 to 0xe00d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74840
INFO: task kworker/0:143:3616 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:144:3617 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:144 state:D stack:0 pid:3617 tgid:3617 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00d9d84 r8:00000002 r7:60000013 r6:e00d9d8c r5:84ca1800
r4:84ca1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74a00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7038c r4:84e70000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7038c r4:84e11680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca1800 r8:84e116ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11680 r8:80287e08 r7:e00d5e60 r6:84e06980 r5:84ca1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00d9fb0 to 0xe00d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74980
INFO: task kworker/0:144:3617 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:145:3621 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:145 state:D stack:0 pid:3621 tgid:3621 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00e5d84 r8:00000002 r7:60000113 r6:e00e5d8c r5:84ca3c00
r4:84ca3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74b40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe81000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7078c r4:84e70400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7078c r4:84e11780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca3c00 r8:84e117ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11780 r8:80287e08 r7:e00d5e60 r6:84e06a00 r5:84ca3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00e5fb0 to 0xe00e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74a80
INFO: task kworker/0:145:3621 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:146:3622 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:146 state:D stack:0 pid:3622 tgid:3622 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00e9d84 r8:00000002 r7:60000113 r6:e00e9d8c r5:84ca2400
r4:84ca2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74d40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca2400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeeb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e70f8c r4:84e70c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e70f8c r4:84e11600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca2400 r8:84e1162c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11600 r8:80287e08 r7:e00d5e60 r6:84e06a80 r5:84ca2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00e9fb0 to 0xe00e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74c40
INFO: task kworker/0:146:3622 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:147:3624 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:147 state:D stack:0 pid:3624 tgid:3624 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00f1d84 r8:00000002 r7:60000113 r6:e00f1d8c r5:84ca5400
r4:84ca5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfaf80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca5400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e71b8c r4:84e71800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e71b8c r4:84e11880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca5400 r8:84e118ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11880 r8:80287e08 r7:e00e9e60 r6:84e06b00 r5:84ca5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00f1fb0 to 0xe00f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74c40
INFO: task kworker/0:147:3624 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:148:3625 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:148 state:D stack:0 pid:3625 tgid:3625 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00f5d84 r8:00000002 r7:60000113 r6:e00f5d8c r5:84ca3000
r4:84ca3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00f5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e74e80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca3000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfef5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7138c r4:84e71000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7138c r4:84e11700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca3000 r8:84e1172c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11700 r8:80287e08 r7:e00f1e60 r6:84e06b80 r5:84ca3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00f5fb0 to 0xe00f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74f80
INFO: task kworker/0:148:3625 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:149:3627 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:149 state:D stack:0 pid:3627 tgid:3627 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e00fdd84 r8:00000002 r7:60000113 r6:e00fdd8c r5:84ca4800
r4:84ca4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00fde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e08d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7178c r4:84e71400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7178c r4:84e11800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca4800 r8:84e1182c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11800 r8:80287e08 r7:e00f1e60 r6:84e06c00 r5:84ca4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00fdfb0 to 0xe00fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e74dc0
INFO: task kworker/0:149:3627 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:150:3630 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:150 state:D stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0111d84 r8:00000002 r7:60000113 r6:e0111d8c r5:84d89800
r4:84d89800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d89800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0111e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d89800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffc9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7338c r4:84e73000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7338c r4:84e11a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d89800 r8:84e11a2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11a00 r8:80287e08 r7:e00f1e60 r6:84e06c80 r5:84d89800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0111fb0 to 0xe0111ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfae80
INFO: task kworker/0:150:3630 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:151:3631 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:151 state:D stack:0 pid:3631 tgid:3631 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0115d84 r8:00000002 r7:60000113 r6:e0115d8c r5:84ca8000
r4:84ca8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0115e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e7b100
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff1b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e71f8c r4:84e71c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e71f8c r4:84e11980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca8000 r8:84e119ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11980 r8:80287e08 r7:e0111e60 r6:84e06d00 r5:84ca8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0115fb0 to 0xe0115ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e08680
INFO: task kworker/0:151:3631 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:152:3633 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:152 state:D stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e011dd84 r8:00000002 r7:60000013 r6:e011dd8c r5:84ca9800
r4:84ca9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e011de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7238c r4:84e72000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7238c r4:84e11a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca9800 r8:84e11aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11a80 r8:80287e08 r7:e0111e60 r6:84e06d80 r5:84ca9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe011dfb0 to 0xe011dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90080
INFO: task kworker/0:152:3633 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:153:3635 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:153 state:D stack:0 pid:3635 tgid:3635 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0125d84 r8:00000002 r7:60000113 r6:e0125d8c r5:84ca8c00
r4:84ca8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0125e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90180
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ca8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff99000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7278c r4:84e72400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7278c r4:84e11b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca8c00 r8:84e11b2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11b00 r8:80287e08 r7:e0111e60 r6:84e06e00 r5:84ca8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0125fb0 to 0xe0125ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90280
INFO: task kworker/0:153:3635 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:154:3637 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:154 state:D stack:0 pid:3637 tgid:3637 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0131d84 r8:00000002 r7:60000113 r6:e0131d8c r5:84caa400
r4:84caa400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84caa400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0131e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84caa400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e72b8c r4:84e72800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e72b8c r4:84e11c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84caa400 r8:84e11c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11c00 r8:80287e08 r7:e0111e60 r6:84e06e80 r5:84caa400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0131fb0 to 0xe0131ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90140
INFO: task kworker/0:154:3637 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:155:3639 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:155 state:D stack:0 pid:3639 tgid:3639 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0139d84 r8:00000002 r7:60000113 r6:e0139d8c r5:84cab000
r4:84cab000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cab000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0139e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cab000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e72f8c r4:84e72c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e72f8c r4:84e11c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cab000 r8:84e11cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11c80 r8:80287e08 r7:e0111e60 r6:84e06f00 r5:84cab000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0139fb0 to 0xe0139ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f902c0
INFO: task kworker/0:155:3639 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:156:3642 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:156 state:D stack:0 pid:3642 tgid:3642 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e044dd84 r8:00000002 r7:60000113 r6:e044dd8c r5:84cac800
r4:84cac800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cac800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e044de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f906c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cac800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffd5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e7378c r4:84e73400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e7378c r4:84e11d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cac800 r8:84e11d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11d00 r8:80287e08 r7:e0111e60 r6:84e06f80 r5:84cac800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe044dfb0 to 0xe044dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f904c0
INFO: task kworker/0:156:3642 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:157:3644 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:157 state:D stack:0 pid:3644 tgid:3644 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:84cad400
r4:84cad400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cad400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cad400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e013f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e73b8c r4:84e73800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e73b8c r4:84e11d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cad400 r8:84e11dac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11d80 r8:80287e08 r7:e044de60 r6:84df8d80 r5:84cad400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0459fb0 to 0xe0459ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90600
INFO: task kworker/0:157:3644 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:158:3646 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:158 state:D stack:0 pid:3646 tgid:3646 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0461d84 r8:00000002 r7:60000113 r6:e0461d8c r5:84caec00
r4:84caec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84caec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0461e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90c80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84caec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e048b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb4b8c r4:84fb4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb4b8c r4:84e11900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84caec00 r8:84e1192c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11900 r8:80287e08 r7:e0459e60 r6:84df8f80 r5:84caec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0461fb0 to 0xe0461ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90600
INFO: task kworker/0:158:3646 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1713000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:159:3647 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:159 state:D stack:0 pid:3647 tgid:3647 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0469d84 r8:00000002 r7:60000113 r6:e0469d8c r5:84cabc00
r4:84cabc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cabc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cabc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0455000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e73f8c r4:84e73c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e73f8c r4:84e11e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cabc00 r8:84e11e2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11e00 r8:80287e08 r7:e0461e60 r6:84df8800 r5:84cabc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0469fb0 to 0xe0469ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90a00
INFO: task kworker/0:159:3647 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:160:3650 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:160 state:D stack:0 pid:3650 tgid:3650 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e047dd84 r8:00000002 r7:60000113 r6:e047dd8c r5:84cae000
r4:84cae000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cae000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cae000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e046f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb438c r4:84fb4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb438c r4:84e11f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cae000 r8:84e11f2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11f00 r8:80287e08 r7:e0461e60 r6:84fa8000 r5:84cae000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe047dfb0 to 0xe047dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90780
INFO: task kworker/0:160:3650 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:161:3651 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:161 state:D stack:0 pid:3651 tgid:3651 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0481d84 r8:00000002 r7:60000013 r6:e0481d8c r5:84cb0000
r4:84cb0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0475000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb478c r4:84fb4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb478c r4:84e11f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb0000 r8:84e11fac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e11f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e11f80 r8:80287e08 r7:e0461e60 r6:84fa8080 r5:84cb0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0481fb0 to 0xe0481ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90a40
INFO: task kworker/0:161:3651 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:162:3653 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:162 state:D stack:0 pid:3653 tgid:3653 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0495d84 r8:00000002 r7:60000113 r6:e0495d8c r5:84cb1800
r4:84cb1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0495e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f81040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb538c r4:84fb5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb538c r4:84fa2000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb1800 r8:84fa202c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2000 r8:80287e08 r7:e0461e60 r6:84fa8100 r5:84cb1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0495fb0 to 0xe0495ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90bc0
INFO: task kworker/0:162:3653 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:163:3656 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:163 state:D stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e04a5d84 r8:00000002 r7:60000113 r6:e04a5d8c r5:84cb0c00
r4:84cb0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90e40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0491000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb4f8c r4:84fb4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb4f8c r4:84fa2180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb0c00 r8:84fa21ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2180 r8:80287e08 r7:e0495e60 r6:84fa8180 r5:84cb0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a5fb0 to 0xe04a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90cc0
INFO: task kworker/0:163:3656 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:164:3657 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:164 state:D stack:0 pid:3657 tgid:3657 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e04a9d84 r8:00000002 r7:60000113 r6:e04a9d8c r5:84cb3c00
r4:84cb3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f90ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb578c r4:84fb5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb578c r4:84fa2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb3c00 r8:84fa222c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2200 r8:80287e08 r7:e0495e60 r6:84fa8200 r5:84cb3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04a9fb0 to 0xe04a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f90d80
INFO: task kworker/0:164:3657 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:165:3659 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:165 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84cb4800
r4:84cb4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb678c r4:84fb6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb678c r4:84fa2080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb4800 r8:84fa20ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2080 r8:80287e08 r7:e04a9e60 r6:84fa8280 r5:84cb4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04b9fb0 to 0xe04b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f81dc0
INFO: task kworker/0:165:3659 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:166:3662 blocked for more than 451 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:166 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e04d1d84 r8:00000002 r7:60000013 r6:e04d1d8c r5:84cb2400
r4:84cb2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb5b8c r4:84fb5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb5b8c r4:84fa2300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb2400 r8:84fa232c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2300 r8:80287e08 r7:e04b9e60 r6:84fa8300 r5:84cb2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04d1fb0 to 0xe04d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84faf080
INFO: task kworker/0:166:3662 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc6-syzkaller #0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb5f8c r4:84fb5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb5f8c r4:84fa2280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ce3000 r8:84fa22ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2280 r8:80287e08 r7:e04b9e60 r6:84fa2400 r5:84ce3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00c9fb0 to 0xe00c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84faf280
INFO: task kworker/0:167:3663 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:168:3666 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r10:8291a684 r9:e04d9d84 r8:00000002 r7:60000113 r6:e04d9d8c r5:841f5400
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:841f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb638c r4:84fb6000
r7:dddced80 r6:83018000 r5:84fb638c r4:84fa2380
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:84d9d400
r5:84d9d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf8c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d9d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0503000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb738c r4:84fb7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb738c r4:84fa2100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d9d400 r8:84fa212c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2100 r8:80287e08 r7:e04b9e60 r6:84fa2580 r5:84d9d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04e5fb0 to 0xe04e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84faf3c0
INFO: task kworker/0:169:3669 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e04edd84 r8:00000002 r7:60000013 r6:e04edd8c r5:84cf0000
r4:84cf0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cf0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf5c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cf0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb6b8c r4:84fb6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb6b8c r4:84fa2600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cf0000 r8:84fa262c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2600 r8:80287e08 r7:e04e5e60 r6:84fa2480 r5:84cf0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe04edfb0 to 0xe04edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84faf500
INFO: task kworker/0:170:3670 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:171:3672 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:171 state:D stack:0 pid:3672 tgid:3672 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000113 r6:e04f9d8c r5:84cf0c00
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84faf780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cf0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84cf0c00 r8:84fa26ac r7:82804d40 r6:dddced80 r5:dddceda0
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:172:3674 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:172 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:84cf2400 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:173:3676 blocked for more than 452 seconds.
r10:8291a684 r9:e0519d84 r8:00000002 r7:60000113 r6:e0519d8c r5:84cf3c00
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fafc80
r5:00001000 r4:e050f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84fb7b8c r4:84fb7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84fb7b8c r4:84fa2980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cf3c00 r8:84fa29ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2980 r8:80287e08 r7:e0501e60 r6:84fa2a80 r5:84cf3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0519fb0 to 0xe0519ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fafa80
INFO: task kworker/0:173:3676 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
r4:84faf940
Workqueue: events bpf_prog_free_deferred
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
r4:00000000
r5:84e5378c r4:84e53400
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:175:3679 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:175 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0525d84 r8:00000002 r7:60000013 r6:e0525d8c r5:84cb6000
r4:84cb6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0525e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cb6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e052d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff038c r4:84ff0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff038c r4:84fa2a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cb6000 r8:84fa2a2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2a00 r8:80287e08 r7:e051de60 r6:84fa8400 r5:84cb6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0525fb0 to 0xe0525ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fafe40
INFO: task kworker/0:175:3679 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace:
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84cb6c00 r8:84fa2bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2b80 r8:80287e08 r7:e0525e60 r6:84fa8480 r5:84cb6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe00adfb0 to 0xe00adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502d100
INFO: task kworker/0:176:3683 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d87ac0
r5:84cb3000 r4:8291a680
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
task:kworker/0:178 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0539e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cf1800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff178c r4:84ff1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff178c r4:84fa2b00
r10:61c88647 r9:84cf1800 r8:84fa2b2c r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:113:3690 blocked for more than 452 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0549d84 r8:00000002 r7:60000113 r6:e0549d8c r5:84cf5400
r4:84cf5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cf5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8457b980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84cf5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebcf8c r4:84ebcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebcf8c r4:84fa8500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cf5400 r8:84fa852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa8500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa8500 r8:80287e08 r7:e005de60 r6:84fa2c80 r5:84cf5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0549fb0 to 0xe0549ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8457b640
INFO: task kworker/1:113:3690 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:00001000 r4:dfeb3000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:179:3692 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:179 state:D stack:0 pid:3692 tgid:3692 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e054dd84 r8:00000002 r7:60000013 r6:e054dd8c r5:84cf6000
r4:84cf6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cf6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e054de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfa69000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff138c r4:84ff1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff138c r4:84fa2880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cf6000 r8:84fa28ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2880
r10:00000000 r9:84fa2880 r8:80287e08 r7:e0539e60 r6:84fa2d80 r5:84cf6000
INFO: task kworker/0:179:3692 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:84e5378c r4:84e53400
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:84ebd78c r4:84ebd400
r10:61c88647 r9:84cf6c00 r8:84fa86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:180:3696 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:180 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0555d84 r8:00000002 r7:60000113 r6:e0555d8c r5:84ca6c00
r4:84ca6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502dd80
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:115:3698 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:115 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0575e08
r5:84ebd38c r4:84ebd000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
INFO: task kworker/1:115:3698 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:181:3699 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:84cb9800 r4:8291a680
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502d1c0
r5:84ff278c r4:84ff2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000000
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:00000000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Not tainted 6.15.0-rc6-syzkaller #0
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502df00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cba400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff1f8c r4:84ff1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff1f8c r4:8502b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cba400 r8:8502b02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b000 r8:80287e08 r7:e0579e60 r6:84fa8880 r5:84cba400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe057dfb0 to 0xe057dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502de00
INFO: task kworker/0:182:3700 is blocked on a mutex likely owned by task kworker/0:123:3540.
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:00000000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:183:3702 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:183 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0585d84 r8:00000002 r7:60000013 r6:e0585d8c r5:84cb8000
r4:84cb8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cb8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0585e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:84ff238c r4:84ff2000
r10:61c88647 r9:84cb8000 r8:8502b12c r7:82804d40 r6:dddced80 r5:dddceda0
Call trace:
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:8291a684 r9:e058dd84 r8:00000002 r7:60000013 r6:e058dd8c r5:84cbb000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r5:800f0013 r4:80239bb0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r4:84cbd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cbd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
INFO: task kworker/0:186:3708 blocked for more than 452 seconds.
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff978c r4:84ff9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff978c r4:8502b380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cbc800 r8:8502b3ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b380 r8:80287e08 r7:e058de60 r6:84fa8a80 r5:84cbc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05b9fb0 to 0xe05b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:85036280
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:8291a684 r9:e05c9d84 r8:00000002 r7:60000013 r6:e05c9d8c r5:84cbbc00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r5:84cbe000 r4:8291a680
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05e9fb0 to 0xe05e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850362c0
INFO: task kworker/0:188:3712 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0605d84 r8:00000002 r7:60000013 r6:e0605d8c r5:84cbec00
r4:84cbec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cbec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0605e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850364c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:84ff3b8c r4:84ff3800
r10:61c88647 r9:84cbec00 r8:8502b52c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85036600
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0615d84 r8:00000002 r7:60000113 r6:e0615d8c r5:85068c00
r4:85068c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85068c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850366c0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:8502b200
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:dffe1dc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:191:3719 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:191 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0621d84 r8:00000002 r7:60000113 r6:e0621d8c r5:85068000
r4:85068000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:84ff838c r4:84ff8000
r7:dddced80 r6:83018000 r5:84ff838c r4:8502b400
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8506b000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:84ff878c r4:84ff8400
r7:dddced80 r6:83018000 r5:84ff878c r4:8502b680
r10:61c88647 r9:8506b000 r8:8502b6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b680 r8:80287e08 r7:e05b9e60 r6:84fa8d80 r5:8506b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0625fb0 to 0xe0625ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85036740
INFO: task kworker/0:192:3720 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:193:3723 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:193 state:D stack:0 pid:3723 tgid:3723 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0631d84 r8:00000002 r7:60000113 r6:e0631d8c r5:8506c800
r4:8506c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8506c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8506c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e000b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff8b8c r4:84ff8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff8b8c r4:8502b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8506c800 r8:8502b62c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b600 r8:80287e08 r7:e05b9e60 r6:84fa8e00 r5:8506c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0631fb0 to 0xe0631ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85036880
INFO: task kworker/0:193:3723 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r5:800f0013 r4:80239bb0
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:194:3724 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:194 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0635d84 r8:00000002 r7:60000013 r6:e0635d8c r5:8506a400
r4:8506a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8506a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8506a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0019000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff8f8c r4:84ff8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff8f8c r4:8502b700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8506a400 r8:8502b72c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b700 r8:80287e08 r7:e05b9e60 r6:84fa8e80 r5:8506a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0635fb0 to 0xe0635ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850369c0
INFO: task kworker/0:194:3724 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:195:3726 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:195 state:D stack:0 pid:3726 tgid:3726 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0545d84 r8:00000002 r7:60000113 r6:e0545d8c r5:84cf3000
r4:84cf3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cf3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85036c80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cf3000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0027000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff938c r4:84ff9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff938c r4:8502b780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cf3000 r8:8502b7ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b780 r8:80287e08 r7:e05b9e60 r6:8502b800 r5:84cf3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0545fb0 to 0xe0545ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85036bc0
INFO: task kworker/0:195:3726 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:196:3729 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:196 state:D stack:0 pid:3729 tgid:3729 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:84cf4800
r4:84cf4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84cf4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84cf4800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0049000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff9f8c r4:84ff9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff9f8c r4:8502b980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84cf4800 r8:8502b9ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b980 r8:80287e08 r7:e05b9e60 r6:8502b580 r5:84cf4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0639fb0 to 0xe0639ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85036e40
INFO: task kworker/0:196:3729 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:197:3730 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:197 state:D stack:0 pid:3730 tgid:3730 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0641d84 r8:00000002 r7:60000113 r6:e0641d8c r5:84ec8000
r4:84ec8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9afc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ec8000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e003f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ff9b8c r4:84ff9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ff9b8c r4:8502b880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec8000 r8:8502b8ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b880 r8:80287e08 r7:e0639e60 r6:8502ba80 r5:84ec8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0641fb0 to 0xe0641ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fafd80
INFO: task kworker/0:197:3730 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:198:3733 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:198 state:D stack:0 pid:3733 tgid:3733 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:84ec8c00
r4:84ec8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850503c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ec8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0061000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffa78c r4:84ffa400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffa78c r4:8502b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec8c00 r8:8502b92c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502b900 r8:80287e08 r7:e0639e60 r6:8502bb00 r5:84ec8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0645fb0 to 0xe0645ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050200
INFO: task kworker/0:198:3733 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:199:3735 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:199 state:D stack:0 pid:3735 tgid:3735 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e053dd84 r8:00000002 r7:60000113 r6:e053dd8c r5:84eca400
r4:84eca400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84eca400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84eca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0057000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffa38c r4:84ffa000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffa38c r4:8502bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84eca400 r8:8502bbac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502bb80 r8:80287e08 r7:e0645e60 r6:8502ba00 r5:84eca400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe053dfb0 to 0xe053dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050080
INFO: task kworker/0:199:3735 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:200:3738 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:200 state:D stack:0 pid:3738 tgid:3738 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0649d84 r8:00000002 r7:60000013 r6:e0649d8c r5:84ecb000
r4:84ecb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ecb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ecb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05ad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffaf8c r4:84ffac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffaf8c r4:8502bc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ecb000 r8:8502bc2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502bc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502bc00 r8:80287e08 r7:e0645e60 r6:8502bd00 r5:84ecb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0649fb0 to 0xe0649ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050380
INFO: task kworker/0:200:3738 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:201:3739 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:201 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e064dd84 r8:00000002 r7:60000013 r6:e064dd8c r5:84ecc800
r4:84ecc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ecc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ecc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e059f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffab8c r4:84ffa800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffab8c r4:8502bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ecc800 r8:8502bdac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502bd80 r8:80287e08 r7:e0649e60 r6:8502be80 r5:84ecc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe064dfb0 to 0xe064dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050480
INFO: task kworker/0:201:3739 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:202:3741 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:202 state:D stack:0 pid:3741 tgid:3741 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0655d84 r8:00000002 r7:60000013 r6:e0655d8c r5:84ecd400
r4:84ecd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ecd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ecd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffb38c r4:84ffb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffb38c r4:8502bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ecd400 r8:8502bcac r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502bc80 r8:80287e08 r7:e0649e60 r6:8502be00 r5:84ecd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0655fb0 to 0xe0655ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050600
INFO: task kworker/0:202:3741 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:203:3742 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:203 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84ece000
r4:84ece000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ece000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ece000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e007b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffbf8c r4:84ffbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffbf8c r4:84fa2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ece000 r8:84fa2fac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84fa2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa2f80 r8:80287e08 r7:e0655e60 r6:84fa2e80 r5:84ece000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0659fb0 to 0xe0659ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050a00
INFO: task kworker/0:203:3742 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:204:3744 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:204 state:D stack:0 pid:3744 tgid:3744 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e065dd84 r8:00000002 r7:60000113 r6:e065dd8c r5:84ec9800
r4:84ec9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e065de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8f200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ec9800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8501038c r4:85010000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501038c r4:8502bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec9800 r8:8502bf2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8502bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8502bf00 r8:80287e08 r7:e0659e60 r6:8502bf80 r5:84ec9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe065dfb0 to 0xe065dff8)
dfa0: 00000000 00000000 00000000 00000000
r4:850508c0
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r5:800f0013 r4:80239bb0
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:116:3746 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:116 state:D stack:0 pid:3746 tgid:3746 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0671d84 r8:00000002 r7:60000013 r6:e0671d8c r5:84ec1800
r4:84ec1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ec1800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb6b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebdf8c r4:84ebdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebdf8c r4:8505b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec1800 r8:8505b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b080 r8:80287e08 r7:e0551e60 r6:8505b180 r5:84ec1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0671fb0 to 0xe0671ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505a100
INFO: task kworker/1:116:3746 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:117:3750 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:117 state:D stack:0 pid:3750 tgid:3750 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:8506bc00
r4:8506bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8506bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a4c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8506bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebe38c r4:84ebe000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebe38c r4:8505b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8506bc00 r8:8505b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b000 r8:80287e08 r7:e0671e60 r6:8505b280 r5:8506bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0651fb0 to 0xe0651ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505a280
INFO: task kworker/1:117:3750 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:118:3753 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:118 state:D stack:0 pid:3753 tgid:3753 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e045dd84 r8:00000002 r7:60000113 r6:e045dd8c r5:84ec0c00
r4:84ec0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e045de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ec0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc3b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebef8c r4:84ebec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebef8c r4:8505b100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec0c00 r8:8505b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b100 r8:80287e08 r7:e0651e60 r6:85054000 r5:84ec0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe045dfb0 to 0xe045dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505a500
INFO: task kworker/1:118:3753 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:205:3755 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:205 state:D stack:0 pid:3755 tgid:3755 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:84ec3c00
r4:84ec3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850479c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ec3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff15000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffbb8c r4:84ffb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84ffbb8c r4:85054080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec3c00 r8:850540ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85054080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054080 r8:80287e08 r7:e0659e60 r6:85054100 r5:84ec3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0485fb0 to 0xe0485ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85047000
INFO: task kworker/0:205:3755 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1ed9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:119:3756 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:119 state:D stack:0 pid:3756 tgid:3756 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0499d84 r8:00000002 r7:60000113 r6:e0499d8c r5:84ec0000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0: 00000000 00000000 00000000 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800f0013 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:120:3757 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:120 state:D stack:0 pid:3757 tgid:3757 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e049dd84 r8:00000002 r7:60000013 r6:e049dd8c r5:84ec2400
r4:84ec2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ec2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505a840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ec2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebeb8c r4:84ebe800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84ec2400 r8:8505b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505a5c0
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:84e0be80
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:121:3760 blocked for more than 452 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:121 state:D stack:0 pid:3760 tgid:3760 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e04bdd84 r8:00000002 r7:60000013 r6:e04bdd8c r5:84ec4800
r4:84ec4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:84ebf38c r4:84ebf000
r10:61c88647 r9:84ec4800 r8:8505b4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
INFO: task kworker/1:121:3760 is blocked on a mutex likely owned by task kworker/0:123:3540.
r4:82ac21e4
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
task:kworker/1:122 state:D stack:0 pid:3762 tgid:3762 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:84ebf78c r4:84ebf400
r4:8505b500
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:84ec6000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505ad00
r5:84ebfb8c r4:84ebf800
r4:8505b580
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:124 state:D stack:0 pid:3766 tgid:3766 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505aec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ec6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfdbb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ebff8c r4:84ebfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84ebff8c r4:8505b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ec6c00 r8:8505b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b600 r8:80287e08 r7:e067de60 r6:85054400 r5:84ec6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0681fb0 to 0xe0681ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505ad40
INFO: task kworker/1:124:3766 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84ec3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:126 state:D stack:0 pid:3770 tgid:3770 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:84ecec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85050700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ecec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8421a38c r4:8421a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8421a38c r4:8505b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ecec00 r8:8505b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b680 r8:80287e08 r7:e068de60 r6:85054500 r5:84ecec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0691fb0 to 0xe0691ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8457b640
INFO: task kworker/1:126:3770 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:127 state:D stack:0 pid:3772 tgid:3772 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0695d84 r8:00000002 r7:60000013 r6:e0695d8c r5:84ecbc00
r4:84ecbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ecbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85032e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ecbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a038c r4:850a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a038c r4:8505b780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ecbc00 r8:8505b7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b780 r8:80287e08 r7:e0691e60 r6:85054580 r5:84ecbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0695fb0 to 0xe0695ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050f40
INFO: task kworker/1:127:3772 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r5:84c38000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c38000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe7f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a078c r4:850a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a078c r4:8505b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c38000 r8:8505b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b800 r8:80287e08 r7:e0695e60 r6:85054600 r5:84c38000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0699fb0 to 0xe0699ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85050cc0
INFO: task kworker/1:128:3774 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d87ac0
r10:8291a684 r9:e069dd84 r8:00000002 r7:60000113 r6:e069dd8c r5:84c38c00
r4:00000000
r5:850a0b8c r4:850a0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c38c00 r8:8505b8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b880 r8:80287e08 r7:e0699e60 r6:8505b700 r5:84c38c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe069dfb0 to 0xe069dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504a280
INFO: task kworker/1:129:3777 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:130 state:D stack:0 pid:3779 tgid:3779 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:85069800
r4:85069800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85069800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85069800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a138c r4:850a1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a138c r4:8505b980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85069800 r8:8505b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b980 r8:80287e08 r7:e069de60 r6:8505b900 r5:85069800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0661fb0 to 0xe0661ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504a2c0
INFO: task kworker/1:130:3779 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:131:3780 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:131 state:D stack:0 pid:3780 tgid:3780 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0079d84 r8:00000002 r7:60000113 r6:e0079d8c r5:8506d400
r4:8506d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8506d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0079e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a3c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8506d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfef3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a0f8c r4:850a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a0f8c r4:8505b380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8506d400 r8:8505b3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505b380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505b380 r8:80287e08 r7:e0661e60 r6:8505ba00 r5:8506d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0079fb0 to 0xe0079ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504a380
INFO: task kworker/1:131:3780 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:132:3782 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:132 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:84ca6000
r4:84ca6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ca6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ca6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a178c r4:850a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a178c r4:8505ba80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ca6000 r8:8505baac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505ba80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505ba80 r8:80287e08 r7:e0661e60 r6:8505bc00 r5:84ca6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a5fb0 to 0xe06a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504a5c0
INFO: task kworker/1:132:3782 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
task:kworker/1:133 state:D stack:0 pid:3785 tgid:3785 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:8506e000
r4:8506e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8506e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504a980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8506e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffa7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a1b8c r4:850a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a1b8c r4:8505bb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8506e000 r8:8505bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505bb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505bb00 r8:80287e08 r7:e06a5e60 r6:8505bd00 r5:8506e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a9fb0 to 0xe06a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504a600
INFO: task kworker/1:133:3785 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:134:3788 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:134 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06a1d84 r8:00000002 r7:60000013 r6:e06a1d8c r5:8506ec00
r4:8506ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8506ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504aa80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8506ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffbf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a1f8c r4:850a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a1f8c r4:8505bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8506ec00 r8:8505bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505bb80 r8:80287e08 r7:e06a9e60 r6:8505bd80 r5:8506ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06a1fb0 to 0xe06a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504a8c0
INFO: task kworker/1:134:3788 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:135:3789 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:135 state:D stack:0 pid:3789 tgid:3789 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0479d84 r8:00000002 r7:60000113 r6:e0479d8c r5:85070c00
r4:85070c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85070c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8504ac80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85070c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffd3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a238c r4:850a2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a238c r4:8505be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85070c00 r8:8505be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505be00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505be00 r8:80287e08 r7:e06a1e60 r6:8505bf00 r5:85070c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0479fb0 to 0xe0479ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504ad40
INFO: task kworker/1:135:3789 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:136:3791 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:136 state:D stack:0 pid:3791 tgid:3791 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06b5d84 r8:00000002 r7:60000113 r6:e06b5d8c r5:85071800
r4:85071800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85071800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850531c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85071800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a2f8c r4:850a2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a2f8c r4:8505bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85071800 r8:8505bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8505bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8505bc80 r8:80287e08 r7:e0479e60 r6:8505be80 r5:85071800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b5fb0 to 0xe06b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8504ac40
INFO: task kworker/1:136:3791 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:206:3793 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:206 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06b9d84 r8:00000002 r7:60050013 r6:e06b9d8c r5:85072400
r4:85072400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85072400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85054680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054680 r8:80287e08 r7:e0659e60 r6:8505bf80 r5:85072400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06b9fb0 to 0xe06b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85047c80
INFO: task kworker/0:206:3793 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:207:3794 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a278c r4:850a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:850a278c r4:85054780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85073000 r8:850547ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85054780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054780 r8:80287e08 r7:e06b9e60 r6:84fa8f00 r5:85073000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06bdfb0 to 0xe06bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85047c80
INFO: task kworker/0:207:3794 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85073c00 r8:8505482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:208:3798 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:208 state:D stack:0 pid:3798 tgid:3798 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06c5d84 r8:00000002 r7:60000113 r6:e06c5d8c r5:85074800
r4:85074800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85074800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8f5c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85074800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8501078c r4:85010400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501078c r4:8504e100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85074800 r8:8504e12c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8504e100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504e100 r8:80287e08 r7:e06b9e60 r6:85054700 r5:85074800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c5fb0 to 0xe06c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85047cc0
INFO: task kworker/0:208:3798 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:138:3800 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:138 state:D stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06c1d84 r8:00000002 r7:60000013 r6:e06c1d8c r5:85075400
r5:85075400 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a338c r4:850a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:85054a00
r10:00000000 r9:85054a00 r8:80287e08 r7:e06b5e60 r6:85054880 r5:85075400
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfeb3000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054980 r8:80287e08 r7:e06c1e60 r6:85054b80 r5:85076c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06cdfb0 to 0xe06cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85053400
INFO: task kworker/1:139:3801 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:140:3804 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:140 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06d1d84 r8:00000002 r7:60000113 r6:e06d1d8c r5:85076000
r4:85076000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85076000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85076000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e010d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a3f8c r4:850a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a3f8c r4:85054a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85076000 r8:85054aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85054a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054a80 r8:80287e08 r7:e06cde60 r6:85054c80 r5:85076000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d1fb0 to 0xe06d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85053640
INFO: task kworker/1:140:3804 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:141:3806 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:141 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:84c3bc00
r4:84c3bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c3bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053880
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a3b8c r4:850a3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a3b8c r4:85054b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c3bc00 r8:85054b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85054b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054b00 r8:80287e08 r7:e06d1e60 r6:8504e000 r5:84c3bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06d9fb0 to 0xe06d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85053840
INFO: task kworker/1:141:3806 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r10:8291a684 r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:84c39800
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84c39800 r8:85054dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Call trace:
r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r5:84c3ec00 r4:8291a680
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85053ac0
INFO: task kworker/1:143:3811 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2162000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:144:3812 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:144 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06f1d84 r8:00000002 r7:60000113 r6:e06f1d8c r5:84c3c800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r5:00001000 r4:dfeb3000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:84d87ac0
task:kworker/1:145 state:D stack:0 pid:3813 tgid:3813 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06f5d84 r8:00000002 r7:60000113 r6:e06f5d8c r5:84c3d400
r4:84c3d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c3d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85053d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c3d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e013b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a8b8c r4:850a8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a8b8c r4:85054e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c3d400 r8:85054eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85054e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85054e80 r8:80287e08 r7:e06ede60 r6:8504e280 r5:84c3d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06f5fb0 to 0xe06f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85053bc0
INFO: task kworker/1:145:3813 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a3561000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:146:3815 blocked for more than 453 seconds.
r10:8291a684 r9:e06fdd84 r8:00000002 r7:60000013 r6:e06fdd8c r5:84c3a400
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:850a8f8c r4:85054f80
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r5:800f0013 r4:80239bb0
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
r5:00001000 r4:dfeb3000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:147:3818 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:147 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e05bdd84 r8:00000002 r7:60000113 r6:e05bdd8c r5:84c40c00
r5:84c40c00 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85047b40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9ba000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a978c r4:850a9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a978c r4:8503c080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c40c00 r8:8503c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c080 r8:80287e08 r7:e06ede60 r6:8504e380 r5:84c40c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe05bdfb0 to 0xe05bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:dffe1dc0
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:148:3820 blocked for more than 453 seconds.
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:84c40000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:149:3822 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:149 state:D stack:0 pid:3822 tgid:3822 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0705d84 r8:00000002 r7:60000113 r6:e0705d8c r5:84c43000
r4:84c43000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c43000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0705e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c43000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:850aaf8c r4:8503c180
r10:00000000 r9:8503c180 r8:80287e08 r7:e061de60 r6:8504e480 r5:84c43000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: a415f000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:84e0be80
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850341c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c41800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850a9f8c r4:850a9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850a9f8c r4:8503c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c41800 r8:8503c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c280 r8:80287e08 r7:e0705e60 r6:8504e500 r5:84c41800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0709fb0 to 0xe0709ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85034140
INFO: task kworker/1:150:3823 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a44f6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:151:3825 blocked for more than 453 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:151 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0711d84 r8:00000002 r7:60000113 r6:e0711d8c r5:84c42400
r4:84c42400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c42400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c42400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850aa38c r4:850aa000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850aa38c r4:8503c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c42400 r8:8503c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c000 r8:80287e08 r7:e0705e60 r6:8504e580 r5:84c42400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0711fb0 to 0xe0711ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85034180
INFO: task kworker/1:151:3825 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:850aa78c r4:850aa400
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r5:85070000 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85070000 r8:8503c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c400 r8:80287e08 r7:e0705e60 r6:8503c480 r5:85070000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06c9fb0 to 0xe06c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85034380
INFO: task kworker/1:153:3829 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a49b7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:154:3832 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:154 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0721d84 r8:00000002 r7:60000013 r6:e0721d8c r5:85080000
r4:85080000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85080000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034b40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85080000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850abb8c r4:850ab800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85080000 r8:8503c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xe0721fb0 to 0xe0721ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0: 00000000 00000000 00000000 00000000
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r4:85080c00
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85080c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcf7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850ab38c r4:850ab000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850ab38c r4:8503c580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85080c00 r8:8503c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c580 r8:80287e08 r7:e0721e60 r6:8503c680 r5:85080c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0725fb0 to 0xe0725ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85034a40
INFO: task kworker/1:155:3834 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a4dc4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:156:3836 blocked for more than 454 seconds.
r4:85081800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08
r5:00001000 r4:dfd2b000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:8291a684 r9:e072dd84 r8:00000002 r7:60000013 r6:e072dd8c r5:85082400
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034cc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850abf8c r4:850abc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850abf8c r4:8503c700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85082400 r8:8503c72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c700 r8:80287e08 r7:e0721e60 r6:8503c880 r5:85082400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe072dfb0 to 0xe072dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85034b00
INFO: task kworker/1:157:3838 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a538c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:158:3839 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:158 state:D stack:0 pid:3839 tgid:3839 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:85083c00
r4:85083c00
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8503f7c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85083c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84ffb78c r4:84ffb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:160:3844 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:160 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0739d84 r8:00000002 r7:60000113 r6:e0739d8c r5:85084800
r4:85084800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85084800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9e140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85084800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0021000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b478c r4:850b4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b478c r4:8503c900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85084800 r8:8503c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503c900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503c900 r8:80287e08 r7:e0731e60 r6:8503cb80 r5:85084800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0739fb0 to 0xe0739ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
1d20: a5e68000 eca77000 00000001 80239b98 7f035000 00000001
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:161:3846 blocked for more than 454 seconds.
r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:85083000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85083000 r8:8503ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:162:3849 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:162 state:D stack:0 pid:3849 tgid:3849 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e073dd84 r8:00000002 r7:60000113 r6:e073dd8c r5:85086c00
r4:85086c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85086c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e073de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9e340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b4b8c r4:850b4800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xe073dfb0 to 0xe073dff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
r5:00001000 r4:dfeb3000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b4f8c r4:850b4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b4f8c r4:8503cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85086000 r8:8503cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503cc00 r8:80287e08 r7:e0735e60 r6:8503cd00 r5:85086000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0741fb0 to 0xe0741ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f9e480
INFO: task kworker/1:163:3850 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a666b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:164:3852 blocked for more than 454 seconds.
r4:85088000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9e940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85088000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e046b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b5b8c r4:850b5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b5b8c r4:8503ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85088000 r8:8503ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503ce00 r8:80287e08 r7:e0735e60 r6:8503cf00 r5:85088000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0749fb0 to 0xe0749ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f9e880
INFO: task kworker/1:164:3852 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a666b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:165:3854 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:850b578c r4:850b5400
r10:61c88647 r9:85088c00 r8:85054f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
Exception stack(0xe074dfb0 to 0xe074dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84f9e740
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d20: a6973000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:dffe1dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9eac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c46000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0473000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b5f8c r4:850b5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b5f8c r4:8503cf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c46000 r8:8503cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503cf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503cf80 r8:80287e08 r7:e0749e60 r6:8504e680 r5:84c46000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0759fb0 to 0xe0759ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f9e740
INFO: task kworker/1:166:3856 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a6d31000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:167:3858 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
r10:8291a684 r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:84c45400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:850b638c r4:84f94100
r10:61c88647 r9:84c45400 r8:84f9412c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94100 r8:80287e08 r7:e0759e60 r6:8504e800 r5:84c45400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0761fb0 to 0xe0761ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f9ea80
INFO: task kworker/1:167:3858 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a6d31000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0765fb0 to 0xe0765ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f9ecc0
INFO: task kworker/1:168:3859 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a71e1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
r5:84e5378c r4:84e53400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:169 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0769d84 r8:00000002 r7:60000113 r6:e0769d8c r5:84c3e000
r4:84c3e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c3e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84c3e000 r8:84f9402c r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:170:3865 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:170 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f9eec0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ed9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b778c r4:850b7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b778c r4:84f94200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ed9800 r8:84f9422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94200 r8:80287e08 r7:e0765e60 r6:8504ea00 r5:84ed9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0775fb0 to 0xe0775ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f9ea80
INFO: task kworker/1:171:3867 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a7c12000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:172:3869 blocked for more than 454 seconds.
Workqueue: events bpf_prog_free_deferred
r4:84eda400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b738c r4:850b7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b738c r4:84f94280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84eda400 r8:84f942ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94280 r8:80287e08 r7:e0775e60 r6:8504e900 r5:84eda400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe076dfb0 to 0xe076dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8c100
INFO: task kworker/1:172:3869 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a7d67000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:84edb000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xe0779fb0 to 0xe0779ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:174:3874 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:174 state:D stack:0 pid:3874 tgid:3874 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e077dd84 r8:00000002 r7:60000113 r6:e077dd8c r5:84edbc00
r4:84edbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84edbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c4c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84edbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e050d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b7f8c r4:850b7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b7f8c r4:84f94480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84edbc00 r8:84f944ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94480 r8:80287e08 r7:e0779e60 r6:8504e980 r5:84edbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe077dfb0 to 0xe077dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8c180
INFO: task kworker/1:174:3874 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a8562000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r4:84edc800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08
r9:83018205 r8:84edc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
r5:850b878c r4:850b8400
r10:61c88647 r9:84edc800 r8:84f9452c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r5:800f0013 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:176:3878 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:176 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0785d84 r8:00000002 r7:60000113 r6:e0785d8c r5:84edd400
r4:84edd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84edd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0785e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84edd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e051f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b838c r4:850b8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b838c r4:84f94580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84edd400 r8:84f945ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94580 r8:80287e08 r7:e0781e60 r6:8504eb80 r5:84edd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0785fb0 to 0xe0785ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8c600
INFO: task kworker/1:176:3878 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a8918000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:209:3880 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:209 state:D stack:0 pid:3880 tgid:3880 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0791d84 r8:00000002 r7:60000013 r6:e0791d8c r5:84ede000
r4:84ede000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ede000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8ff80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ede000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85010b8c r4:85010800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85010b8c r4:8504ec00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ede000 r8:8504ec2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:8504ec00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504ec00 r8:80287e08 r7:e06b9e60 r6:8504ec80 r5:84ede000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0791fb0 to 0xe0791ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8f940
INFO: task kworker/0:209:3880 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a8f07000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0: 00000000 00000000 00000000 00000000
r10:8291a684 r9:e0795d84 r8:00000002 r7:60000113 r6:e0795d8c r5:84edec00
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8c8c0
r9:83018205 r8:84edec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e053f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b8b8c r4:850b8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b8b8c r4:84f94380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84edec00 r8:84f943ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94380 r8:80287e08 r7:e0781e60 r6:8504ed00 r5:84edec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0795fb0 to 0xe0795ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8c6c0
INFO: task kworker/1:177:3881 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
task:kworker/1:178 state:D stack:0 pid:3883 tgid:3883 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8ca40
r7:ddde2d80 r6:83018200 r5:850b8f8c r4:84f94600
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Call trace:
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:179:3885 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:179 state:D stack:0 pid:3885 tgid:3885 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e079dd84 r8:00000002 r7:60000013 r6:e079dd8c r5:84c3b000
r4:84c3b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c3b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e079de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
r9:83018205 r8:84c3b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
r5:850b938c r4:850b9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84f94700 r8:80287e08 r7:e0799e60 r6:8504ee00 r5:84c3b000
r4:84f8ca00
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r5:800f0013 r4:80239bb0
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e07a1d84 r8:00000002 r7:60000013 r6:e07a1d8c r5:84fd0000
r4:84fd0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fd0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8cd80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84fd0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850b9b8c r4:850b9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850b9b8c r4:84f94780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fd0000 r8:84f947ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94780 r8:80287e08 r7:e079de60 r6:8504ee80 r5:84fd0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07a1fb0 to 0xe07a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8c1c0
INFO: task kworker/1:180:3887 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9bad000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc6-syzkaller #0
r4:84fd0c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fd0c00 r8:84f9482c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94800 r8:80287e08 r7:e07a1e60 r6:8504ef00 r5:84fd0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07a5fb0 to 0xe07a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8c1c0
INFO: task kworker/1:181:3888 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9fa7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:84fd1800 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r9:83018205 r8:84fd1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
r5:850ba38c r4:850ba000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
r5:00001000 r4:dfeb3000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:183 state:D stack:0 pid:3894 tgid:3894 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8cf00
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:850b9f8c r4:84f94680
r10:00000000 r9:84f94680 r8:80287e08 r7:e07a9e60 r6:84e78f80 r5:84fd3000
r4:84f8c1c0
INFO: task kworker/1:183:3894 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aabd7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:184:3896 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:184 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e07b5d84 r8:00000002 r7:60000113 r6:e07b5d8c r5:84fd2400
r4:84fd2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fd2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85034f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84fd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0609000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850ba78c r4:850ba400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850ba78c r4:84f94880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fd2400 r8:84f948ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94880 r8:80287e08 r7:e07a9e60 r6:84fa8f80 r5:84fd2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07b5fb0 to 0xe07b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85034dc0
INFO: task kworker/1:184:3896 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aabd7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Workqueue: events bpf_prog_free_deferred
r5:84fd5400 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8a040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84fd5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e062b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850bab8c r4:850ba800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bab8c r4:84f94900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fd5400 r8:84f9492c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94900 r8:80287e08 r7:e07b5e60 r6:84e11b80 r5:84fd5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07c5fb0 to 0xe07c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8cf80
INFO: task kworker/1:185:3897 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aae85000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:186:3899 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:186 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e07c9d84 r8:00000002 r7:60000113 r6:e07c9d8c r5:84fd6000
r4:84fd6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fd6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8a3c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84fd6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
r5:850bb38c r4:850bb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bb38c r4:84f94a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fd6000 r8:84f94a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94a00 r8:80287e08 r7:e07c5e60 r6:84e11e80 r5:84fd6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07c9fb0 to 0xe07c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8cf80
INFO: task kworker/1:186:3899 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aae85000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:187:3901 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:187 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e07d1d84 r8:00000002 r7:60000113 r6:e07d1d8c r5:84fd4800
r4:84fd4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fd4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850baf8c r4:850bac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84fd4800 r8:84f949ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8a000
INFO: task kworker/1:187:3901 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aae85000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:210:3904 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:210 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e07cdd84 r8:00000002 r7:60000113 r6:e07cdd8c r5:84fd6c00
r4:84fd6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fd6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f95c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84fd6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e080f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8501178c r4:85011400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501178c r4:84f86080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:84f86080
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ab2dc000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:211:3905 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0801000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8501138c r4:85011000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501138c r4:84f86100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fd3c00 r8:84f8612c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86100 r8:80287e08 r7:e07cde60 r6:84f86180 r5:84fd3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe07d9fb0 to 0xe07d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f95600
INFO: task kworker/0:211:3905 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: abe19000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84ed0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
r5:850bb78c r4:850bb400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8a380
INFO: task kworker/1:188:3907 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: abe19000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:189:3909 blocked for more than 454 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:189 state:D stack:0 pid:3909 tgid:3909 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r5:84ed0c00 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r9:83018205 r8:84ed0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
r5:850bbb8c r4:850bb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bbb8c r4:84f94b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:84f94b80
r10:00000000 r9:84f94b80 r8:80287e08 r7:e07e1e60 r6:84f86300 r5:84ed0c00
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:189:3909 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace:
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:190:3912 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:190 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0809d84 r8:00000002 r7:60000013 r6:e0809d8c r5:84ed2400
r4:84ed2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0809e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8aa80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ed2400 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc57000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850bc78c r4:850bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bc78c r4:84f94c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ed2400 r8:84f94cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94c80 r8:80287e08 r7:e07f9e60 r6:84f86380 r5:84ed2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0809fb0 to 0xe0809ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8a600
INFO: task kworker/1:190:3912 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ac1b1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:191:3914 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:191 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0751d84 r8:00000002 r7:600b0113 r6:e0751d8c r5:84ed3000
r4:84ed3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8af40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ed3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:850bbf8c r4:850bbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84f94d00 r8:80287e08 r7:e0809e60 r6:84f86400 r5:84ed3000
r4:84f8a600
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800f0013 r4:80239bb0
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:212:3916 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:212 state:D stack:0 pid:3916 tgid:3916 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0755d84 r8:00000002 r7:60000113 r6:e0755d8c r5:84ed3c00
r4:84ed3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f954c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ed3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0833000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85011f8c r4:85011c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85011f8c r4:84f86500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ed3c00 r8:84f8652c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86500 r8:80287e08 r7:e07cde60 r6:84f86580 r5:84ed3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0755fb0 to 0xe0755ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f95c80
INFO: task kworker/0:212:3916 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: acf9a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:213:3917 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:213 state:D stack:0 pid:3917 tgid:3917 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0825d84 r8:00000002 r7:60000013 r6:e0825d8c r5:84ed4800
r4:84ed4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
r9:83018005 r8:84ed4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
r5:85011b8c r4:85011800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84f86480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86480 r8:80287e08 r7:e0755e60 r6:84f86700 r5:84ed4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0825fb0 to 0xe0825ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f95f80
INFO: task kworker/0:213:3917 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: acf9a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:214:3921 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:214 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e082dd84 r8:00000002 r7:60000013 r6:e082dd8c r5:84ed5400
r4:84ed5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e082de08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0040
r5:00001000 r4:e0839000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8501238c r4:85012000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501238c r4:84f86600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ed5400 r8:84f8662c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r5:00001000 r4:dfeb3000
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
task:kworker/0:215 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa02c0
INFO: task kworker/0:215:3924 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ad72c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:216:3926 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:216 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e0871d84 r8:00000002 r7:60000113 r6:e0871d8c r5:84ed6c00
r4:84ed6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0871e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa06c0
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8501338c r4:85013000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501338c r4:84f86680
r10:61c88647 r9:84ed6c00 r8:84f866ac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84f86680 r8:80287e08 r7:e0845e60 r6:84f86a00 r5:84ed6c00
1fa0: 00000000 00000000 00000000 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:e0879d84 r8:00000002 r7:60000113 r6:e0879d8c r5:84fe8000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0879e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84fe8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e086e000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85012b8c r4:85012800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85012b8c r4:84f86880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fe8000 r8:84f868ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86880 r8:80287e08 r7:e0871e60 r6:84f86b00 r5:84fe8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe0879fb0 to 0xe0879ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa05c0
INFO: task kworker/0:217:3928 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ade89000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:218:3929 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:218 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e083dd84 r8:00000002 r7:60000113 r6:e083dd8c r5:84fe8c00
r4:84fe8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fe8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e083de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa04c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84fe8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e087b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85012f8c r4:85012c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85012f8c r4:84f86980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fe8c00 r8:84f869ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86980 r8:80287e08 r7:e0871e60 r6:84f86a80 r5:84fe8c00
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/0:218:3929 is blocked on a mutex likely owned by task kworker/0:123:3540.
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ade89000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:219:3932 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:219 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e4885d84 r8:00000002 r7:60000013 r6:e4885d8c r5:84fe9800
r4:84fe9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84fe9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4885e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84fe9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e489f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8501378c r4:85013400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8501378c r4:84f86b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fe9800 r8:84f86bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86b80 r8:80287e08 r7:e0871e60 r6:84f86d00 r5:84fe9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4885fb0 to 0xe4885ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0b00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84fea400 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df99f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85013f8c r4:85013c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85013f8c r4:84f86c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fea400 r8:84f86c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f86c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f86c00 r8:80287e08 r7:e4885e60 r6:84f86e00 r5:84fea400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe4891fb0 to 0xe4891ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa0800
INFO: task kworker/0:220:3936 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aebb0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84fec800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84fec800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850bcb8c r4:850bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bcb8c r4:84f94c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84fec800 r8:84f94c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94c00 r8:80287e08 r7:e0809e60 r6:84f86c80 r5:84fec800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe06e5fb0 to 0xe06e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8acc0
INFO: task kworker/1:192:3944 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:193:3946 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:193 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e48b9d84 r8:00000002 r7:60000113 r6:e48b9d8c r5:84feb000
r4:84feb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84feb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:850bd78c r4:850bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84feb000 r8:84f94dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
r4:84fed400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4899e08
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850bcf8c r4:850bcc00
r10:61c88647 r9:84fed400 r8:84f94aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:84fee000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84fee000 r8:84f86dac r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: af3ac000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:222:3951 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:222 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e48c1d84 r8:00000002 r7:60000013 r6:e48c1d8c r5:84feec00
r4:84feec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84feec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0d40
r9:83018005 r8:84feec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
r5:8511038c r4:85110000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:85030000 r8:80287e08 r7:e48bde60 r6:85030080 r5:84feec00
INFO: task kworker/0:222:3951 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:223:3952 blocked for more than 455 seconds.
r5:84febc00 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa0d00
r5:850bc38c r4:850bc000
r10:61c88647 r9:84febc00 r8:8503012c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030100 r8:80287e08 r7:e48c1e60 r6:85030180 r5:84febc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48c5fb0 to 0xe48c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502c0c0
INFO: task kworker/0:223:3952 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b01fb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:224:3953 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:224 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e48c9d84 r8:00000002 r7:60000113 r6:e48c9d8c r5:84c58000
r4:84c58000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c58000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48c9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa1bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84c58000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
r5:8511178c r4:85111400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8511178c r4:85030200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c58000 r8:8503022c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030200 r8:80287e08 r7:e48c5e60 r6:85030280 r5:84c58000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48c9fb0 to 0xe48c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502c0c0
INFO: task kworker/0:224:3953 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b01fb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:225:3954 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:225 state:D stack:0 pid:3954 tgid:3954 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e48cdd84 r8:00000002 r7:60000113 r6:e48cdd8c r5:84c58c00
r4:84c58c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c58c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502c6c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84c58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8511078c r4:85110400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8511078c r4:85030300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c58c00 r8:8503032c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030300 r8:80287e08 r7:e48c9e60 r6:85030380 r5:84c58c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48cdfb0 to 0xe48cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502c0c0
INFO: task kworker/0:225:3954 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:195:3955 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:195 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e48d1d84 r8:00000002 r7:60010113 r6:e48d1d8c r5:84c59800
r4:84c59800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c59800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4380
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:850bd38c r4:850bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84c59800 r8:84f94f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b0911000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:196:3959 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:196 state:D stack:0 pid:3959 tgid:3959 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e07fdd84 r8:00000002 r7:60000013 r6:e07fdd8c r5:84c5bc00
r4:84c5bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c5bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07fde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4500
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:850bdb8c r4:850bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84c5bc00 r8:84f94fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:196:3959 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace:
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:00001000 r4:dfeb3000
r5:84e5378c r4:84e53400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:197:3960 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:197 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e48d9d84 r8:00000002 r7:60000013 r6:e48d9d8c r5:84c5c800
r4:84c5c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c5c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c5c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff0b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850bdf8c r4:850bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bdf8c r4:84f94e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c5c800 r8:84f94eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84f94e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f94e80 r8:80287e08 r7:e07fde60 r6:85030600 r5:84c5c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48d9fb0 to 0xe48d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa4540
INFO: task kworker/1:197:3960 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b0dd4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r9:83018205 r8:84c5e000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
5fa0: 00000000 00000000 00000000 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b1350000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r9:83018205 r8:84c5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
r4:84fb1180
INFO: task kworker/1:199:3963 is blocked on a mutex likely owned by task kworker/0:123:3540.
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa4800
INFO: task kworker/1:200:3965 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b1b6a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:201:3968 blocked for more than 455 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:850bef8c r4:850bec00
r7:ddde2d80 r6:83018200 r5:850bef8c r4:84fb1100
r10:00000000 r9:84fb1100 r8:80287e08 r7:e48e5e60 r6:85030700 r5:84c5d400
r4:84fa4ac0
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b1b6a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:84c5b000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85110f8c r4:85110c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85110f8c r4:85030780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c5b000 r8:850307ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030780 r8:80287e08 r7:e48c9e60 r6:85030800 r5:84c5b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48f9fb0 to 0xe48f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502cc80
INFO: task kworker/0:226:3969 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b1e25000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
r10:8291a684 r9:e8909d84 r8:00000002 r7:60000113 r6:e8909d8c r5:850e8000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:850bf78c r4:850bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:850e8000 r8:84fb12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfeb3000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa4d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0091000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850bf38c r4:850bf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bf38c r4:84fb1380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850e8c00 r8:84fb13ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1380 r8:80287e08 r7:e8909e60 r6:85030900 r5:850e8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe890dfb0 to 0xe890dff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:850c138c r4:850c1000
r10:00000000 r9:84fb1400 r8:80287e08 r7:e8909e60 r6:85030980 r5:850eb000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e891dd84 r8:00000002 r7:60000013 r6:e891dd8c r5:850e9800
r4:850e9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850e9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e891de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8a980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r7:ddde2d80 r6:83018200 r5:850bfb8c r4:84fb1480
r4:84f8a740
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:850ec800
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:850bff8c r4:850bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850bff8c r4:84fb1500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850ec800 r8:84fb152c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1500 r8:80287e08 r7:e8919e60 r6:85030a80 r5:850ec800
r4:00000001
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:850ed400
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:84fb1600
r4:84fa4240
1d20: b3af1000 eca77000 00000001 80239b98 7f035000 00000001
r4:84e0be80
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r9:83018205 r8:850ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0117000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c078c r4:850c0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c078c r4:84fb1680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850ebc00 r8:84fb16ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1680 r8:80287e08 r7:e8919e60 r6:85030b80 r5:850ebc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8935fb0 to 0xe8935ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa4240
INFO: task kworker/1:208:3982 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:00001000 r4:dfeb3000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
r5:850c0b8c r4:850c0800
Exception stack(0xe893dfb0 to 0xe893dff8)
r4:00000000
r4:dffe1dc0
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Not tainted 6.15.0-rc6-syzkaller #0
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e48d5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f981c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8508b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e013d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c0f8c r4:850c0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c0f8c r4:84fb1780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8508b000 r8:84fb17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1780 r8:80287e08 r7:e8919e60 r6:84fb1800 r5:8508b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe48d5fb0 to 0xe48d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f98080
INFO: task kworker/1:210:3986 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r5:8508e000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:85110b8c r4:85110800
r7:ddde2d80 r6:83018200 r5:85110b8c r4:84fb1880
r10:00000000 r9:84fb1880 r8:80287e08 r7:e8919e60 r6:84fb1900 r5:8508e000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f983c0
INFO: task kworker/1:211:3988 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b407b000 eca77000 00000001 80239b98 7f035000 00000001
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:212:3991 blocked for more than 455 seconds.
r4:8508ec00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:850c178c r4:850c1400
r7:ddde2d80 r6:83018200 r5:850c178c r4:84fb1580
r10:00000000 r9:84fb1580 r8:80287e08 r7:e48b5e60 r6:84fb1700 r5:8508ec00
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:213 state:D stack:0 pid:3993 tgid:3993 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r4:00000000
r5:8511138c r4:85111000
r7:ddde2d80 r6:83018200 r5:8511138c r4:84fb1980
r10:00000000 r9:84fb1980 r8:80287e08 r7:e8949e60 r6:84fb1b00 r5:8508d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe894dfb0 to 0xe894dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f98600
INFO: task kworker/1:213:3993 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b45a2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:214:3995 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:214 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e8951d84 r8:00000002 r7:60000113 r6:e8951d8c r5:8508bc00
r4:8508bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8508bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c1b8c r4:850c1800
r10:61c88647 r9:8508bc00 r8:84fb1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/0:227 state:D stack:0 pid:3997 tgid:3997 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d400
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfcef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8511238c r4:85112000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8511238c r4:85030d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850eec00 r8:85030d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030d00 r8:80287e08 r7:e48c9e60 r6:85030f80 r5:850eec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8945fb0 to 0xe8945ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa1b00
INFO: task kworker/0:227:3997 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b4e03000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:228:3999 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:228 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e8965d84 r8:00000002 r7:60000113 r6:e8965d8c r5:850ea400
r4:850ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r4:00000000
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:85111b8c r4:85111800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85111b8c r4:85030e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850ea400 r8:85030eac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030e80 r8:80287e08 r7:e8945e60 r6:85030d80 r5:850ea400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe8965fb0 to 0xe8965ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa1b00
INFO: task kworker/0:228:3999 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b4e03000 eca77000 00000001 80239b98 7f035000 00000001
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:215:4000 blocked for more than 455 seconds.
Workqueue: events bpf_prog_free_deferred
r4:84ed1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ed1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e895de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f98e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84ed1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea98d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:850c238c r4:850c2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84ed1800 r8:84fb1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1b80 r8:80287e08 r7:e8951e60 r6:85030f00 r5:84ed1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xe895dfb0 to 0xe895dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f98940
INFO: task kworker/1:215:4000 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b5257000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:229:4003 blocked for more than 455 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:229 state:D stack:0 pid:4003 tgid:4003 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:850f0c00
r4:850f0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea989e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:850f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfb2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85111f8c r4:85111c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85111f8c r4:85030c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f0c00 r8:85030cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85030c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85030c80 r8:80287e08 r7:e8945e60 r6:85030e00 r5:850f0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea989fb0 to 0xea989ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa1f40
INFO: task kworker/0:229:4003 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b5257000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:216:4004 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:216 state:D stack:0 pid:4004 tgid:4004 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea991d84 r8:00000002 r7:60000113 r6:ea991d8c r5:850f1800
r4:850f1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c1f8c r4:850c1c00
r7:ddde2d80 r6:83018200 r5:850c1f8c r4:84fb1c00
r10:00000000 r9:84fb1c00 r8:80287e08 r7:e895de60 r6:84f89000 r5:850f1800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b56e8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:217 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9a1d84 r8:00000002 r7:60000113 r6:ea9a1d8c r5:850f3000
r4:850f3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f98e80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea99b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c278c r4:850c2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c278c r4:84fb1d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f3000 r8:84fb1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1d00 r8:80287e08 r7:e895de60 r6:84f89080 r5:850f3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9a1fb0 to 0xea9a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b59db000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:218:4009 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:218 state:D stack:0 pid:4009 tgid:4009 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:850f2400
r4:850f2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c2f8c r4:850c2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c2f8c r4:84fb1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f2400 r8:84fb1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1e00 r8:80287e08 r7:ea9a1e60 r6:84f89100 r5:850f2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9adfb0 to 0xea9adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f98ec0
INFO: task kworker/1:218:4009 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b59db000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:219:4010 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:219 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9b5d84 r8:00000002 r7:60000113 r6:ea9b5d8c r5:850f4800
r4:850f4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f98980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000
r5:850c2b8c r4:850c2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c2b8c r4:84fb1e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f4800 r8:84fb1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1e80 r8:80287e08 r7:ea9ade60 r6:84f89180 r5:850f4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9b5fb0 to 0xea9b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f98400
INFO: task kworker/1:219:4010 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b5f28000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r5:84e5378c r4:84e53400
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:220:4012 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:220 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9bdd84 r8:00000002 r7:60000013 r6:ea9bdd8c r5:850f3c00
r4:850f3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfaad000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c838c r4:850c8000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c838c r4:84fb1d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f3c00 r8:84fb1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1d80 r8:80287e08 r7:ea9ade60 r6:84f89200 r5:850f3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9bdfb0 to 0xea9bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f98ec0
INFO: task kworker/1:220:4012 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b620b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:221:4015 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:221 state:D stack:0 pid:4015 tgid:4015 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:850f6c00
r4:850f6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f821c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9c5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c338c r4:850c3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c338c r4:84fb1f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f6c00 r8:84fb1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1f80 r8:80287e08 r7:ea9bde60 r6:84f89280 r5:850f6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9cdfb0 to 0xea9cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:dffe1dc0
r5:00001000 r4:dfeb3000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:222:4016 blocked for more than 456 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:222 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9d1d84 r8:00000002 r7:60000013 r6:ea9d1d8c r5:850f5400
r4:850f5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:850f5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:850f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c3b8c r4:850c3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c3b8c r4:84fb1f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:850f5400 r8:84fb1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fb1f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fb1f00 r8:80287e08 r7:ea9bde60 r6:84f89300 r5:850f5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d1fb0 to 0xea9d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f822c0
INFO: task kworker/1:222:4016 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b6415000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfa61000
r5:850c3f8c r4:850c3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:850f0000 r8:84e7f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f825c0
INFO: task kworker/1:223:4020 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b65f3000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
r10:8291a684 r9:ea985d84 r8:00000002 r7:60000013 r6:ea985d8c r5:85089800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea985e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85089800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e001f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c8f8c r4:850c8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c8f8c r4:84e7f100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85089800 r8:84e7f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7f100 r8:80287e08 r7:ea9bde60 r6:84e7f180 r5:85089800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea985fb0 to 0xea985ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f825c0
INFO: task kworker/1:224:4022 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b69d7000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82ac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8508c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c878c r4:850c8400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:850c878c r4:84f89400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8508c800 r8:84f8942c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f89400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f89400 r8:80287e08 r7:e8945e60 r6:84e7f000 r5:8508c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e1fb0 to 0xea9e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0d440
INFO: task kworker/0:230:4025 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b69d7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:231:4026 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:231 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:85090000
r4:85090000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85090000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:e48ad000
r5:847d7b8c r4:847d7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84f89500
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b6c5f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
INFO: task kworker/1:225:4027 blocked for more than 456 seconds.
r4:850f6000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:850c8b8c r4:850c8800
r7:ddde2d80 r6:83018200 r5:850c8b8c r4:84e7f200
r10:00000000 r9:84e7f200 r8:80287e08 r7:ea985e60 r6:84f89580 r5:850f6000
Exception stack(0xea9b9fb0 to 0xea9b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f82c40
INFO: task kworker/1:225:4027 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b72e2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:232:4028 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:232 state:D stack:0 pid:4028 tgid:4028 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r4:84c68000
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfeb5000
r5:8511278c r4:85112400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84c68000 r8:84f894ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f89480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f89480 r8:80287e08 r7:ea9e9e60 r6:84f89600 r5:84c68000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9d5fb0 to 0xea9d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0d5c0
INFO: task kworker/0:232:4028 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7962000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:84c6a400
r4:84c6a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c6a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0039000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c938c r4:850c9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c938c r4:84e7f280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c6a400 r8:84e7f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7f280 r8:80287e08 r7:ea985e60 r6:84f89680 r5:84c6a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f5fb0 to 0xea9f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f82f40
INFO: task kworker/1:226:4034 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7962000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:227:4035 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:227 state:D stack:0 pid:4035 tgid:4035 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9f9d84 r8:00000002 r7:60000013 r6:ea9f9d8c r5:84c68c00
r4:84c68c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c68c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0051000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c978c r4:850c9400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c978c r4:84e7f300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c68c00 r8:84e7f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7f300 r8:80287e08 r7:ea9f5e60 r6:84f89800 r5:84c68c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f9fb0 to 0xea9f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f82980
INFO: task kworker/1:227:4035 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7dc8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:84e5378c r4:84e53400
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:228 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f82300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0471000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c9f8c r4:850c9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c9f8c r4:84e7f500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c6bc00 r8:84e7f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7f500 r8:80287e08 r7:ea9f9e60 r6:84f89700 r5:84c6bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa01fb0 to 0xeaa01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa12c0
INFO: task kworker/1:228:4037 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7dc8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:229 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9f1d84 r8:00000002 r7:60000013 r6:ea9f1d8c r5:85092400
r4:85092400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85092400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84fa15c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85092400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0463000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850c9b8c r4:850c9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850c9b8c r4:84e7f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85092400 r8:84e7f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7f580 r8:80287e08 r7:eaa01e60 r6:84e7f400 r5:85092400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9f1fb0 to 0xea9f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84fa12c0
INFO: task kworker/1:229:4038 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d20: b84ba000 eca77000 00000001 80239b98 7f035000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:230:4041 blocked for more than 456 seconds.
r4:85093000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850ca78c r4:850ca400
r7:ddde2d80 r6:83018200 r5:850ca78c r4:84e7f480
r10:00000000 r9:84e7f480 r8:80287e08 r7:eaa01e60 r6:84e7f680 r5:85093000
r4:84e75080
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b84ba000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:231:4042 blocked for more than 456 seconds.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea9e5d84 r8:00000002 r7:60000013 r6:ea9e5d8c r5:85093c00
r4:85093c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85093c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85093c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e048f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850ca38c r4:850ca000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850ca38c r4:84e7f700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85093c00 r8:84e7f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7f700 r8:80287e08 r7:ea9fde60 r6:84e7f600 r5:85093c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea9e5fb0 to 0xea9e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e75080
INFO: task kworker/1:231:4042 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b8ad3000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:233:4044 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:233 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa15d84 r8:00000002 r7:60000113 r6:eaa15d8c r5:85095400
r4:85095400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85095400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0de40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85095400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:85112b8c r4:85112800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84f89780 r8:80287e08 r7:ea9e9e60 r6:84e7f800 r5:85095400
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:232:4046 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:232 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa1dd84 r8:00000002 r7:60000013 r6:eaa1dd8c r5:85094800
r4:85094800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85094800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa1de08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:850cab8c r4:850ca800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85094800 r8:84e7f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:233:4047 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:233 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:85091800
r4:85091800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85091800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa21e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75dc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85091800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0529000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850cb78c r4:850cb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850cb78c r4:84e7fa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85091800 r8:84e7fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7fa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7fa00 r8:80287e08 r7:eaa1de60 r6:84e7f880 r5:85091800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa21fb0 to 0xeaa21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e75080
INFO: task kworker/1:233:4047 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b908c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:234:4049 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:234 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa31d84 r8:00000002 r7:60000013 r6:eaa31d8c r5:85090c00
r4:85090c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85090c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa31e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85090c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850caf8c r4:850cac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850caf8c r4:84e7f900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85090c00 r8:84e7f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7f900
r10:00000000 r9:84e7f900 r8:80287e08 r7:eaa21e60 r6:84e7fb80 r5:85090c00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:235:4051 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:235 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa35d84 r8:00000002 r7:60000013 r6:eaa35d8c r5:85096c00
r4:85096c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85096c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85096c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0511000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850cb38c r4:850cb000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850cb38c r4:84e7fa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85096c00 r8:84e7faac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7fa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7fa80 r8:80287e08 r7:eaa21e60 r6:84e7fb00 r5:85096c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa35fb0 to 0xeaa35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e75480
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b99ad000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:234:4053 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:234 state:D stack:0 pid:4053 tgid:4053 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:8291a684 r9:eaa3dd84 r8:00000002 r7:60000113 r6:eaa3dd8c r5:84c46c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa3de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0dec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84c46c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85112f8c r4:85112c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85112f8c r4:84f89880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c46c00 r8:84f898ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f89880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f89880 r8:80287e08 r7:ea9e9e60 r6:84e7fc00 r5:84c46c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa3dfb0 to 0xeaa3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0dbc0
INFO: task kworker/0:234:4053 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b99ad000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:82ac21e4
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:84e5378c r4:84e53400
r4:84e0be80
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:236 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa45d84 r8:00000002 r7:60000113 r6:eaa45d8c r5:8508a400
r4:8508a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8508a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e75fc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8508a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0541000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850cbb8c r4:850cb800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850cbb8c r4:84e7fc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8508a400 r8:84e7fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7fc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7fc80 r8:80287e08 r7:eaa21e60 r6:84e7fd80 r5:8508a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa45fb0 to 0xeaa45ff8)
5fa0: 00000000 00000000 00000000 00000000
r4:84e75e00
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfeb3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:237:4059 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:237 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa41d84 r8:00000002 r7:60000113 r6:eaa41d8c r5:85098000
r4:85098000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85098000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa41e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85098000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e055b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850cbf8c r4:850cbc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850cbf8c r4:84e7fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85098000 r8:84e7fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7fe00 r8:80287e08 r7:eaa45e60 r6:84e7ff00 r5:85098000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa41fb0 to 0xeaa41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e75f80
INFO: task kworker/1:237:4059 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ba151000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:238:4061 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:238 state:D stack:0 pid:4061 tgid:4061 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa11d84 r8:00000002 r7:60000113 r6:eaa11d8c r5:85098c00
r4:85098c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85098c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85098c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0589000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d438c r4:850d4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d438c r4:84e7fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85098c00 r8:84e7fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7fd00 r8:80287e08 r7:eaa41e60 r6:84e7fe80 r5:85098c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa11fb0 to 0xeaa11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:239:4064 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:239 state:D stack:0 pid:4064 tgid:4064 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa39d84 r8:00000002 r7:60000113 r6:eaa39d8c r5:85099800
r4:85099800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85099800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa39e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a4c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85099800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d4b8c r4:850d4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d4b8c r4:84e10000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85099800 r8:84e1002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10000 r8:80287e08 r7:eaa11e60 r6:84e10180 r5:85099800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa39fb0 to 0xeaa39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0a100
INFO: task kworker/1:239:4064 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ba73a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r4:8509a400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:00001000 r4:e059d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d478c r4:850d4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d478c r4:84e10080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8509a400 r8:84e100ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10080 r8:80287e08 r7:eaa39e60 r6:84e10100 r5:8509a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa49fb0 to 0xeaa49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0a200
INFO: task kworker/1:240:4065 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bb09c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:235:4067 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:235 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:8509b000
r4:8509b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8509b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e016c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8509b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e071b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8511338c r4:85113000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8511338c r4:84f89980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8509b000 r8:84f899ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f89980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f89980 r8:80287e08 r7:ea9e9e60 r6:84e10200 r5:8509b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa4dfb0 to 0xeaa4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0d1c0
INFO: task kworker/0:235:4067 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bb09c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:241:4069 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:241 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa51d84 r8:00000002 r7:60000013 r6:eaa51d8c r5:8509bc00
r4:8509bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8509bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa51e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a8c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8509bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d538c r4:850d5000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e10300 r8:80287e08 r7:eaa39e60 r6:84e10380 r5:8509bc00
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20: bb7ad000 eca77000 00000001 80239b98 7f035000 00000001
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:242:4070 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:242 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:8509c800
r4:8509c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8509c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a600
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d4f8c r4:850d4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d4f8c r4:84e10280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8509c800 r8:84e102ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10280 r8:80287e08 r7:eaa51e60 r6:84e10400 r5:8509c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa59fb0 to 0xeaa59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0a480
INFO: task kworker/1:242:4070 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bbd90000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:243:4072 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:243 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:8509d400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0a9c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8509d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0619000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d578c r4:850d5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d578c r4:84e10480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8509d400 r8:84e104ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10480 r8:80287e08 r7:eaa51e60 r6:84e10580 r5:8509d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa55fb0 to 0xeaa55ff8)
5fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bbd90000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:244:4074 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:244 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa61d84 r8:00000002 r7:60000113 r6:eaa61d8c r5:8509e000
r4:8509e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8509e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa61e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0ad40
r5:00001000 r4:e0665000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:245:4076 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:245 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa65d84 r8:00000002 r7:60000113 r6:eaa65d8c r5:8509ec00
r4:8509ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8509ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa65e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0ab80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8509ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e062d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d5b8c r4:850d5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d5b8c r4:84e10680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8509ec00 r8:84e106ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10680 r8:80287e08 r7:eaa61e60 r6:84e10800 r5:8509ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa65fb0 to 0xeaa65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0ac80
INFO: task kworker/1:245:4076 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bc6bf000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:246:4078 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:246 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa69d84 r8:00000002 r7:60000013 r6:eaa69d8c r5:85150000
r4:85150000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85150000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa69e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0adc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85150000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0685000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d638c r4:850d6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d638c r4:84e10700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85150000 r8:84e1072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10700 r8:80287e08 r7:eaa61e60 r6:84e10880 r5:85150000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa69fb0 to 0xeaa69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0ad00
INFO: task kworker/1:246:4078 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bc97b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:247:4080 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:247 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:85150c00
r4:85150c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85150c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e0d200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85150c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06ff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d678c r4:850d6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d678c r4:84e10900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85150c00 r8:84e1092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10900 r8:80287e08 r7:eaa69e60 r6:84e10a00 r5:85150c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa6dfb0 to 0xeaa6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e0d100
INFO: task kworker/1:247:4080 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bc97b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:248:4082 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:248 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa71d84 r8:00000002 r7:60000013 r6:eaa71d8c r5:85151800
r4:85151800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85151800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa71e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85151800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e070d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d6b8c r4:850d6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d6b8c r4:84e10780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85151800 r8:84e107ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10780 r8:80287e08 r7:eaa6de60 r6:84e10b00 r5:85151800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa71fb0 to 0xeaa71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589080
INFO: task kworker/1:248:4082 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bcfcd000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:249:4084 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:249 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa75d84 r8:00000002 r7:60000113 r6:eaa75d8c r5:85152400
r4:85152400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85152400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85152400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e075d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d6f8c r4:850d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d6f8c r4:84e10980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85152400 r8:84e109ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10980 r8:80287e08 r7:eaa71e60 r6:84e10a80 r5:85152400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa75fb0 to 0xeaa75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589080
INFO: task kworker/1:249:4084 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bd631000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:250:4087 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:250 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa79d84 r8:00000002 r7:60000013 r6:eaa79d8c r5:84c6c800
r4:84c6c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c6c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa79e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e080b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d7b8c r4:850d7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d7b8c r4:84e10b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c6c800 r8:84e10bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10b80 r8:80287e08 r7:eaa75e60 r6:84f89a00 r5:84c6c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa79fb0 to 0xeaa79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589300
INFO: task kworker/1:250:4087 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bd631000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:251:4089 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:251 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:84c6d400
r4:84c6d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c6d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d738c r4:850d7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d738c r4:84e10d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c6d400 r8:84e10d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10d00 r8:80287e08 r7:eaa79e60 r6:84f89b00 r5:84c6d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa81fb0 to 0xeaa81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845893c0
INFO: task kworker/1:251:4089 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:252:4090 blocked for more than 456 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:252 state:D stack:0 pid:4090 tgid:4090 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa85d84 r8:00000002 r7:60000113 r6:eaa85d8c r5:84c6ec00
r4:84c6ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c6ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845895c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d778c r4:850d7400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bdb1e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Not tainted 6.15.0-rc6-syzkaller #0
r4:00000000
r5:00001000 r4:dfc81000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84f89a80
Exception stack(0xeaa89fb0 to 0xeaa89ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800f0013 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
r10:8291a684 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:85153000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85153000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e081f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:850d7f8c r4:850d7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:850d7f8c r4:84e10e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85153000 r8:84e10e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10e00 r8:80287e08 r7:eaa79e60 r6:84e10c00 r5:85153000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa7dfb0 to 0xeaa7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589a00
INFO: task kworker/1:253:4095 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: be879000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518c38c r4:8518c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85154800 r8:84e10cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e10c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e10c80 r8:80287e08 r7:eaa7de60 r6:84e10e80 r5:85154800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa8dfb0 to 0xeaa8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845897c0
INFO: task kworker/1:254:4096 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bed40000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:255:4098 blocked for more than 457 seconds.
r4:85155400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08
r4:00000000
r5:00001000 r4:e0841000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeaa91fb0 to 0xeaa91ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800f0013 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84568000 r8:80287e08 r7:eaa91e60 r6:84568180 r5:85156000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589b00
INFO: task kworker/1:256:4101 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bfa88000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:257:4102 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:257 state:D stack:0 pid:4102 tgid:4102 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaa9dd84 r8:00000002 r7:60000013 r6:eaa9dd8c r5:85156c00
r4:85156c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85156c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84589e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85156c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e4881000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518cf8c r4:8518cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8518cf8c r4:84568080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85156c00 r8:845680ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84568080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84568080 r8:80287e08 r7:eaa95e60 r6:84568280 r5:85156c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa9dfb0 to 0xeaa9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589bc0
INFO: task kworker/1:257:4102 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c016a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84568100 r8:80287e08 r7:eaa9de60 r6:84568200 r5:85158000
r4:84589dc0
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:259:4105 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:259 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaaa5d84 r8:00000002 r7:60000013 r6:eaaa5d8c r5:85158c00
r4:85158c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85158c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85158c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9bc000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518d38c r4:8518d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8518d38c r4:84568300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85158c00 r8:8456832c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84568300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84568300 r8:80287e08 r7:eaaa1e60 r6:84568380 r5:85158c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa5fb0 to 0xeaaa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84589dc0
INFO: task kworker/1:259:4105 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c0c6a000 eca77000 00000001 80239b98 7f035000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:260 state:D stack:0 pid:4108 tgid:4108 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c440
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:8515a400 r8:8456842c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xe48a9fb0 to 0xe48a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3c200
INFO: task kworker/1:260:4108 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c11ee000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:261:4111 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:261 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:e8905d84 r8:00000002 r7:60000013 r6:e8905d8c r5:8515bc00
r4:8515bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8515bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8905e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8515bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518df8c r4:8518dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8518df8c r4:84568580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8515bc00 r8:845685ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3c400
INFO: task kworker/1:261:4111 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c11ee000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
1d20: c186a000 eca77000 00000001 80239b98 7f035000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ea995d84 r8:00000002 r7:60000113 r6:ea995d8c r5:8515d400
r4:8515d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8515d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3c940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8515d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518e78c r4:8518e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8518e78c r4:84568600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8515d400 r8:8456862c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84568600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84568600 r8:80287e08 r7:e8929e60 r6:84568880 r5:8515d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xea995fb0 to 0xea995ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3c940
INFO: task kworker/1:263:4116 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c1ba2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:237:4117 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:237 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c69800 r8:84f89c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f89c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f89c00 r8:80287e08 r7:ea9e9e60 r6:84f89d00 r5:84c69800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaa99fb0 to 0xeaa99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Not tainted 6.15.0-rc6-syzkaller #0
r10:8291a684 r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:84c6b000
r4:84c6b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c6b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:265:4121 blocked for more than 457 seconds.
r10:8291a684 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:85096000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3ccc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85096000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff1d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518eb8c r4:8518e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8518eb8c r4:84568980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85096000 r8:845689ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84568980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84568980 r8:80287e08 r7:eaaade60 r6:84f89e80 r5:85096000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaa9fb0 to 0xeaaa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3cd80
INFO: task kworker/1:265:4121 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d20: c289e000 eca77000 00000001 80239b98 7f035000 00000001
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:266:4124 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:266 state:D stack:0 pid:4124 tgid:4124 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3cf40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:8518f38c r4:84568a00
r10:00000000 r9:84568a00 r8:80287e08 r7:eaaade60 r6:84f89c80 r5:84f10000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:267:4126 blocked for more than 457 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e01140
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84568a80
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:268:4127 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:268 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:84f12400
r4:84f12400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f12400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f12400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8518fb8c r4:8518f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8518fb8c r4:84568b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f12400 r8:84568b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84568b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:269:4129 blocked for more than 457 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:269 state:D stack:0 pid:4129 tgid:4129 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeaacdfb0 to 0xeaacdff8)
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3bd80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84f13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8901000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513038c r4:85130000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513038c r4:84fb1300
r10:61c88647 r9:84f13c00 r8:84fb132c r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
r4:82ac21e4
r5:00001000 r4:dfeb3000
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000113 r6:eaad9d8c r5:84f13000
r5:00001000 r4:e00f9000
r10:61c88647 r9:84f13000 r8:8456882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:8291a684 r9:eaaddd84 r8:00000002 r7:60000013 r6:eaaddd8c r5:84f15400
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843012c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f15400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e010b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8519438c r4:85194000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8519438c r4:84568c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:84301240
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:84e0be80
INFO: task kworker/1:272:4137 blocked for more than 458 seconds.
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:00000000 r9:84568c80 r8:80287e08 r7:eaacde60 r6:84def100 r5:84f16c00
r5:800f0013 r4:80239bb0
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:273:4139 blocked for more than 458 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:273 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:84f14800
r4:84f14800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
r4:dffe1dc0
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Not tainted 6.15.0-rc6-syzkaller #0
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84568e00 r8:80287e08 r7:eaaf1e60 r6:84def200 r5:84f16000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaaf5fb0 to 0xeaaf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84301700
INFO: task kworker/1:274:4141 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c5970000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
1fa0: 00000000 00000000 00000000 00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:8291a684 r9:eaab1d84 r8:00000002 r7:60000013 r6:eaab1d8c r5:8515e000
r5:00001000 r4:dfde3000
r4:84568f00
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c61c7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84def300 r8:80287e08 r7:eaad1e60 r6:84568900 r5:85159800
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Workqueue: events bpf_prog_free_deferred
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:8291a684 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:8515b000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:8515b000 r8:84def42c r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3bdc0
INFO: task kworker/0:241:4150 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c6c7c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84e0be80
r4:84d87ac0
r4:85160000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3b4c0
r7:dddced80 r6:83018000 r5:85130b8c r4:84def500
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:243:4157 blocked for more than 458 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:243 state:D stack:0 pid:4157 tgid:4157 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eab29d84 r8:00000002 r7:60000113 r6:eab29d8c r5:85161800
r4:85161800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85161800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08
r4:00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84f3b600
1d20: c787c000 eca77000 00000001 80239b98 7f035000 00000001
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:61c88647 r9:85160c00 r8:84def5ac r7:82804d40 r6:dddced80 r5:dddceda0
Call trace:
r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
task:kworker/0:245 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845921c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85163c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfed1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513178c r4:85131400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513178c r4:84def700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85163c00 r8:84def72c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84def700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84def700 r8:80287e08 r7:eab31e60 r6:84ded100 r5:85163c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab35fb0 to 0xeab35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84592080
INFO: task kworker/0:245:4160 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c82b2000 eca77000 00000001 80239b98 7f035000 00000001
r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84d87ac0
r10:8291a684 r9:e8911d84 r8:00000002 r7:60000113 r6:e8911d8c r5:85100c00
r5:00001000 r4:e0017000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Call trace:
r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:247:4165 blocked for more than 458 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:247 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:85101800
r4:85101800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85101800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513238c r4:85132000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513238c r4:84def680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85101800 r8:84def6ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84def680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84def680 r8:80287e08 r7:eab31e60 r6:84def900 r5:85101800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
Workqueue: events bpf_prog_free_deferred
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
r4:00000001
Not tainted 6.15.0-rc6-syzkaller #0
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r10:8291a684 r9:eaae9d84 r8:00000002 r7:60000013 r6:eaae9d8c r5:85103c00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84defa80 r8:80287e08 r7:eab41e60 r6:84defb00 r5:85103c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaae9fb0 to 0xeaae9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845928c0
INFO: task kworker/0:250:4170 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c9eb3000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:84e5378c r4:84e53400
1fa0: 00000000 00000000 00000000 00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Workqueue: events bpf_prog_free_deferred
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85106000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85195f8c r4:85195c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85195f8c r4:84ded200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85106000 r8:84ded22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded200 r8:80287e08 r7:eaaf9e60 r6:84defd00 r5:85106000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab4dfb0 to 0xeab4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8458c640
INFO: task kworker/1:277:4175 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:800f0013 r4:80239bb0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ca8fa000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:00001000 r4:dfeb3000
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:254:4179 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:254 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:85108c00
r4:85108c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85108c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84deff00 r8:80287e08 r7:eab41e60 r6:84deff80 r5:85108c00
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
INFO: task kworker/0:256:4184 blocked for more than 459 seconds.
r4:8510a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8510a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df1240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8510a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513c38c r4:8513c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513c38c r4:84e07180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8510a400 r8:84e071ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e07180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07180 r8:80287e08 r7:eab51e60 r6:84e07280 r5:8510a400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Not tainted 6.15.0-rc6-syzkaller #0
r4:00000000
r5:00001000 r4:e0629000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:82ac21e4
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Not tainted 6.15.0-rc6-syzkaller #0
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513c78c r4:8513c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513c78c r4:84e07200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8510bc00 r8:84e0722c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e07200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07200 r8:80287e08 r7:eab69e60 r6:84e07480 r5:8510bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab6dfb0 to 0xeab6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df1380
INFO: task kworker/0:258:4189 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cbd20000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:61c88647 r9:8510c800 r8:84e0732c r7:82804d40 r6:dddced80 r5:dddceda0
Call trace:
r4:82ac21e4
r5:84e5378c r4:84e53400
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r7:dddced80 r6:83018000 r5:8513cf8c r4:84e07580
r10:61c88647 r9:8510e000 r8:84e075ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e07580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07580 r8:80287e08 r7:eab71e60 r6:84e07400 r5:8510e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab61fb0 to 0xeab61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df1600
INFO: task kworker/0:260:4193 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cbd20000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fa0: 00000000 00000000 00000000 00000000
r4:8510ec00
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:82ac21e4
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r5:8510d400 r4:8291a680
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df1a80
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc347000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Not tainted 6.15.0-rc6-syzkaller #0
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
Call trace:
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84e07700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07700 r8:80287e08 r7:eab71e60 r6:84e07900 r5:84f20c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab85fb0 to 0xeab85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df19c0
INFO: task kworker/0:263:4199 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc673000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:00001000 r4:e080d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:280:4205 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:280 state:D stack:0 pid:4205 tgid:4205 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eab99d84 r8:00000002 r7:60000013 r6:eab99d8c r5:84f23c00
r4:84f23c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r5:800f0013 r4:80239bb0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84d87ac0
r5:84f21800 r4:8291a680
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84ded500 r8:80287e08 r7:eab99e60 r6:84e07a00 r5:84f21800
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84f24800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f24800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f844c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84f24800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e087d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513e78c r4:8513e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513e78c r4:84e07a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f24800 r8:84e07aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e07a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07a80 r8:80287e08 r7:eab71e60 r6:84e07b80 r5:84f24800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeab95fb0 to 0xeab95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Workqueue: events bpf_prog_free_deferred
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84a40
r10:61c88647 r9:84f25400 r8:84e07c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e07c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07c00 r8:80287e08 r7:eab95e60 r6:84e07d00 r5:84f25400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba1fb0 to 0xeaba1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f845c0
INFO: task kworker/0:265:4210 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cdf1e000 eca77000 00000001 80239b98 7f035000 00000001
r5:800f0013 r4:80239bb0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:282 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eab81d84 r8:00000002 r7:60000013 r6:eab81d8c r5:84f26000
r4:84f26000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f26000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f26000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
r5:00001000 r4:dfe57000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84ded480 r8:80287e08 r7:eab99e60 r6:84e07d80 r5:84f26000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
1d20: ce3ca000 eca77000 00000001 80239b98 7f035000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:84e5378c r4:84e53400
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:266:4213 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:266 state:D stack:0 pid:4213 tgid:4213 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaba5d84 r8:00000002 r7:60000113 r6:eaba5d8c r5:84f26c00
r4:84f26c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f26c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84f26c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e4895000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513eb8c r4:8513e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84f26c00 r8:84e07cac r7:82804d40 r6:dddced80 r5:dddceda0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ce3ca000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:84f22400
r4:84f22400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f22400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84880
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84f99000 r8:80287e08 r7:eaba1e60 r6:84f99100 r5:84f22400
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f84b40
INFO: task kworker/0:267:4216 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cea2a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:268:4218 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:268 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabadd84 r8:00000002 r7:60000113 r6:eabadd8c r5:851d0000
r4:851d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e895f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513f78c r4:8513f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513f78c r4:84f99180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d0000 r8:84f991ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99180 r8:80287e08 r7:eaba1e60 r6:84f99280 r5:851d0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabadfb0 to 0xeabadff8)
dfa0: 00000000 00000000 00000000 00000000
r4:84f84980
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:269:4220 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:269 state:D stack:0 pid:4220 tgid:4220 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000113 r6:eabb1d8c r5:851d0c00
r4:851d0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9db000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cf433000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:270:4225 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:270 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabb5d84 r8:00000002 r7:60000113 r6:eabb5d8c r5:851d1800
r4:851d1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f84ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfba9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8513ff8c r4:8513fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8513ff8c r4:84f99300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d1800 r8:84f9932c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99300 r8:80287e08 r7:eabb1e60 r6:84f99380 r5:851d1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb5fb0 to 0xeabb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f84fc0
INFO: task kworker/0:270:4225 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cf67a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:271:4227 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:271 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaba9d84 r8:00000002 r7:60000113 r6:eaba9d8c r5:851d2400
r4:851d2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458c680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514838c r4:85148000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514838c r4:84f99400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d2400 r8:84f9942c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99400 r8:80287e08 r7:eabb5e60 r6:84f99480 r5:851d2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaba9fb0 to 0xeaba9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f84fc0
INFO: task kworker/0:271:4227 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cf67a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:272:4228 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:272 state:D stack:0 pid:4228 tgid:4228 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:851d3000
r4:851d3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa0b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514878c r4:85148400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514878c r4:84f99500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d3000 r8:84f9952c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99500 r8:80287e08 r7:eaba9e60 r6:84f99580 r5:851d3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc5fb0 to 0xeabc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f84fc0
INFO: task kworker/0:272:4228 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d030b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:273:4229 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:273 state:D stack:0 pid:4229 tgid:4229 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabc9d84 r8:00000002 r7:60000113 r6:eabc9d8c r5:851d3c00
r4:851d3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502fb80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a278c r4:851a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:851a278c r4:84f99600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d3c00 r8:84f9962c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99600 r8:80287e08 r7:eabc5e60 r6:84f99680 r5:851d3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc9fb0 to 0xeabc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df1f40
INFO: task kworker/0:273:4229 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d030b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:283:4230 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:283 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabcdd84 r8:00000002 r7:60000013 r6:eabcdd8c r5:851d4800
r4:851d4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabcde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfefd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8519738c r4:85197000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8519738c r4:84ded300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d4800 r8:84ded32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded300 r8:80287e08 r7:eab99e60 r6:84f99700 r5:851d4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabcdfb0 to 0xeabcdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91680
INFO: task kworker/1:283:4230 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d095c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:284:4233 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:284 state:D stack:0 pid:4233 tgid:4233 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabd9d84 r8:00000002 r7:60000013 r6:eabd9d8c r5:851d5400
r4:851d5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dffa5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8519778c r4:85197400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8519778c r4:84ded580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d5400 r8:84ded5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded580 r8:80287e08 r7:eab99e60 r6:84f99780 r5:851d5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd9fb0 to 0xeabd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91680
INFO: task kworker/1:284:4233 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0d96000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:285:4235 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:285 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000013 r6:eabe1d8c r5:84f18000
r4:84f18000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f18000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f971c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f18000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e896f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a1f8c r4:851a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a1f8c r4:84ded680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f18000 r8:84ded6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded680 r8:80287e08 r7:eab99e60 r6:84f99800 r5:84f18000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe1fb0 to 0xeabe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91700
INFO: task kworker/1:285:4235 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0d96000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:286:4236 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:286 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabe5d84 r8:00000002 r7:60000113 r6:eabe5d8c r5:84f18c00
r4:84f18c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f18c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f18c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85197f8c r4:85197c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85197f8c r4:84ded700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f18c00 r8:84ded72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded700 r8:80287e08 r7:eabe1e60 r6:84f99880 r5:84f18c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabe5fb0 to 0xeabe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91a40
INFO: task kworker/1:286:4236 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0d96000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:287:4238 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:287 state:D stack:0 pid:4238 tgid:4238 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabedd84 r8:00000002 r7:60000113 r6:eabedd8c r5:84f1a400
r4:84f1a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f919c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0101000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a038c r4:851a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a038c r4:84ded880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1a400 r8:84ded8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded880 r8:80287e08 r7:eabe1e60 r6:84f99900 r5:84f1a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabedfb0 to 0xeabedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91b00
INFO: task kworker/1:287:4238 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1396000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:288:4240 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:288 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabf5d84 r8:00000002 r7:60000113 r6:eabf5d8c r5:84f19800
r4:84f19800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f19800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f19800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0121000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a078c r4:851a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a078c r4:84ded800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f19800 r8:84ded82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded800 r8:80287e08 r7:eabe1e60 r6:84f99980 r5:84f19800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabf5fb0 to 0xeabf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91a00
INFO: task kworker/1:288:4240 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1c8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:289:4242 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:289 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabfdd84 r8:00000002 r7:60000113 r6:eabfdd8c r5:84f1c800
r4:84f1c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e066b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a0b8c r4:851a0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a0b8c r4:84ded900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1c800 r8:84ded92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded900 r8:80287e08 r7:eabe1e60 r6:84f99a00 r5:84f1c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabfdfb0 to 0xeabfdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91b80
INFO: task kworker/1:289:4242 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1c8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:290:4244 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:290 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac05d84 r8:00000002 r7:60000113 r6:eac05d8c r5:84f1bc00
r4:84f1bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac05e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91e40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e082f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a0f8c r4:851a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a0f8c r4:84ded600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1bc00 r8:84ded62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded600 r8:80287e08 r7:eabe1e60 r6:84f99a80 r5:84f1bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac05fb0 to 0xeac05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91c40
INFO: task kworker/1:290:4244 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d2a08000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:291:4246 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:291 state:D stack:0 pid:4246 tgid:4246 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac0dd84 r8:00000002 r7:60000013 r6:eac0dd8c r5:84f1b000
r4:84f1b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac0de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f91f80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1b000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a138c r4:851a1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a138c r4:84ded980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1b000 r8:84ded9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded980 r8:80287e08 r7:eabe1e60 r6:84f99b00 r5:84f1b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac0dfb0 to 0xeac0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91d80
INFO: task kworker/1:291:4246 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d2a08000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:292:4248 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:292 state:D stack:0 pid:4248 tgid:4248 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:84f1ec00
r4:84f1ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f910c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a178c r4:851a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a178c r4:84deda80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1ec00 r8:84dedaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deda80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deda80 r8:80287e08 r7:eabe1e60 r6:84f99b80 r5:84f1ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac15fb0 to 0xeac15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f91ec0
INFO: task kworker/1:292:4248 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d2a08000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:293:4250 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:293 state:D stack:0 pid:4250 tgid:4250 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac19d84 r8:00000002 r7:60000013 r6:eac19d8c r5:84f1d400
r4:84f1d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8921000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a1b8c r4:851a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a1b8c r4:84dedb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1d400 r8:84dedb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dedb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dedb00 r8:80287e08 r7:eabe1e60 r6:84f99c00 r5:84f1d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac19fb0 to 0xeac19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f914c0
INFO: task kworker/1:293:4250 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d3518000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:294:4253 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:294 state:D stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac1dd84 r8:00000002 r7:60000113 r6:eac1dd8c r5:84f1e000
r4:84f1e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f1e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f1e000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8979000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a238c r4:851a2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a238c r4:84deda00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f1e000 r8:84deda2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deda00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deda00 r8:80287e08 r7:eabe1e60 r6:84f99c80 r5:84f1e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac1dfb0 to 0xeac1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f97380
INFO: task kworker/1:294:4253 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d3518000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:295:4255 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:295 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:851d6c00
r4:851d6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a2b8c r4:851a2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a2b8c r4:84ded780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d6c00 r8:84ded7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84ded780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84ded780 r8:80287e08 r7:eac1de60 r6:84f99d00 r5:851d6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac21fb0 to 0xeac21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f970c0
INFO: task kworker/1:295:4255 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d3efe000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:296:4258 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:296 state:D stack:0 pid:4258 tgid:4258 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabc1d84 r8:00000002 r7:60000013 r6:eabc1d8c r5:85166c00
r4:85166c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85166c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97a40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85166c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a378c r4:851a3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a378c r4:84dedc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85166c00 r8:84dedc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dedc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dedc00 r8:80287e08 r7:eac21e60 r6:84dedd00 r5:85166c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabc1fb0 to 0xeabc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f975c0
INFO: task kworker/1:296:4258 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d3efe000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:297:4260 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:297 state:D stack:0 pid:4260 tgid:4260 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:85163000
r4:85163000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85163000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85163000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a2f8c r4:851a2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a2f8c r4:84dede00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85163000 r8:84dede2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dede00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dede00 r8:80287e08 r7:eabc1e60 r6:84dede80 r5:85163000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac11fb0 to 0xeac11ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f97900
INFO: task kworker/1:297:4260 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d473b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:298:4262 blocked for more than 459 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:298 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac25d84 r8:00000002 r7:60000113 r6:eac25d8c r5:85166000
r4:85166000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85166000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac25e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85166000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9c3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a338c r4:851a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a338c r4:84dedd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85166000 r8:84deddac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dedd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dedd80 r8:80287e08 r7:eabc1e60 r6:84dedf80 r5:85166000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac25fb0 to 0xeac25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f97780
INFO: task kworker/1:298:4262 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d4bd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:299:4264 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:299 state:D stack:0 pid:4264 tgid:4264 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac29d84 r8:00000002 r7:60000013 r6:eac29d8c r5:85165400
r4:85165400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85165400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f97bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85165400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a3b8c r4:851a3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a3b8c r4:84e7ff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85165400 r8:84e7ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84e7ff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e7ff80 r8:80287e08 r7:eabc1e60 r6:84dedc80 r5:85165400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac29fb0 to 0xeac29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f97a00
INFO: task kworker/1:299:4264 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d4bd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:300:4265 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:300 state:D stack:0 pid:4265 tgid:4265 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabd1d84 r8:00000002 r7:60000013 r6:eabd1d8c r5:85164800
r4:85164800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85164800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85164800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaac7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a438c r4:851a4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a438c r4:84d86000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85164800 r8:84d8602c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86000 r8:80287e08 r7:eac29e60 r6:84d86080 r5:85164800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabd1fb0 to 0xeabd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f97b80
INFO: task kworker/1:300:4265 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d5128000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:274:4268 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:274 state:D stack:0 pid:4268 tgid:4268 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac35d84 r8:00000002 r7:60000113 r6:eac35d8c r5:8515ec00
r4:8515ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8515ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8515ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85148b8c r4:85148800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85148b8c r4:84f99e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8515ec00 r8:84f99eac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99e80 r8:80287e08 r7:eabc5e60 r6:84d86100 r5:8515ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac35fb0 to 0xeac35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502f2c0
INFO: task kworker/0:274:4268 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d5128000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:275:4269 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:275 state:D stack:0 pid:4269 tgid:4269 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:85162400
r4:85162400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85162400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e4240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85162400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e058f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85149b8c r4:85149800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85149b8c r4:84f99f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85162400 r8:84f99f2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99f00 r8:80287e08 r7:eac35e60 r6:84d86200 r5:85162400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac39fb0 to 0xeac39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e09080
INFO: task kworker/0:275:4269 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d58ff000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:301:4270 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:301 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac3dd84 r8:00000002 r7:60000013 r6:eac3dd8c r5:85170000
r4:85170000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85170000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac3de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84301d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85170000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaab5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a3f8c r4:851a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a3f8c r4:84d86180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85170000 r8:84d861ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86180 r8:80287e08 r7:eabd1e60 r6:84d86280 r5:85170000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac3dfb0 to 0xeac3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f97f00
INFO: task kworker/1:301:4270 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d6072000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:276:4272 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:276 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac49d84 r8:00000002 r7:60000113 r6:eac49d8c r5:85171800
r4:85171800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85171800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e09280
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85171800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaaff000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85148f8c r4:85148c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85148f8c r4:84f99f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85171800 r8:84f99fac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f99f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f99f80 r8:80287e08 r7:eac39e60 r6:84d86300 r5:85171800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac49fb0 to 0xeac49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e09080
INFO: task kworker/0:276:4272 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d6072000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:302:4275 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:302 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac2dd84 r8:00000002 r7:60000113 r6:eac2dd8c r5:85172400
r4:85172400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85172400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85172400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac41000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a4b8c r4:851a4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a4b8c r4:84d86480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85172400 r8:84d864ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86480 r8:80287e08 r7:eabd1e60 r6:84d86500 r5:85172400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac2dfb0 to 0xeac2dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8b0c0
INFO: task kworker/1:302:4275 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d6205000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:303:4277 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:303 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000013 r6:eac4dd8c r5:85173c00
r4:85173c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85173c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b1c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85173c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaad5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a478c r4:851a4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a478c r4:84d86380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85173c00 r8:84d863ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86380 r8:80287e08 r7:eac2de60 r6:84d86600 r5:85173c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac4dfb0 to 0xeac4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8b180
INFO: task kworker/1:303:4277 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d67b0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:304:4280 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:304 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:85173000
r4:85173000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85173000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b9c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85173000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac6f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a578c r4:851a5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a578c r4:84d86400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85173000 r8:84d8642c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86400 r8:80287e08 r7:eac2de60 r6:84d86700 r5:85173000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac51fb0 to 0xeac51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8b4c0
INFO: task kworker/1:304:4280 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d6c73000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:305:4281 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:305 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:85175400
r4:85175400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85175400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85175400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac5b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a4f8c r4:851a4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a4f8c r4:84d86580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85175400 r8:84d865ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86580 r8:80287e08 r7:eac51e60 r6:84d86680 r5:85175400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac59fb0 to 0xeac59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8b4c0
INFO: task kworker/1:305:4281 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d6c73000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:306:4284 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:306 state:D stack:0 pid:4284 tgid:4284 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac31d84 r8:00000002 r7:60000013 r6:eac31d8c r5:85176000
r4:85176000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85176000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac31e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8b7c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85176000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac61000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a538c r4:851a5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a538c r4:84d86780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85176000 r8:84d867ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86780 r8:80287e08 r7:eac51e60 r6:84d86880 r5:85176000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac31fb0 to 0xeac31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8b800
INFO: task kworker/1:306:4284 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d7a51000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:277:4286 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:277 state:D stack:0 pid:4286 tgid:4286 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:8516b000
r4:8516b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8516b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843e4100
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8516b000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e050b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514978c r4:85149400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514978c r4:84e07f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8516b000 r8:84e07f2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e07f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e07f00 r8:80287e08 r7:eac39e60 r6:84e07e80 r5:8516b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac81fb0 to 0xeac81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e095c0
INFO: task kworker/0:277:4286 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d7a51000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:307:4288 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:307 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:85168c00
r4:85168c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85168c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8bb00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85168c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac75000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a5b8c r4:851a5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a5b8c r4:84d86900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85168c00 r8:84d8692c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86900 r8:80287e08 r7:eac51e60 r6:84e07f80 r5:85168c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac89fb0 to 0xeac89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8b980
INFO: task kworker/1:307:4288 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac99d84 r8:00000002 r7:60000013 r6:eac99d8c r5:8516c800
r4:8516c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8516c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8bf00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8516c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a678c r4:851a6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a678c r4:84d86980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8516c800 r8:84d869ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86980 r8:80287e08 r7:eac89e60 r6:84f99d80 r5:8516c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac99fb0 to 0xeac99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8ba40
INFO: task kworker/1:308:4290 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d8217000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84d86a80 r8:80287e08 r7:eac99e60 r6:84f99e00 r5:8516d400
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: d8763000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:310:4293 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:310 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaca9d84 r8:00000002 r7:60000113 r6:eaca9d8c r5:8516ec00
r4:8516ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8516ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f8be00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8516ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac91000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a638c r4:851a6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a638c r4:84d86a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8516ec00 r8:84d86a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86a00 r8:80287e08 r7:eac99e60 r6:84572000 r5:8516ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca9fb0 to 0xeaca9ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:311 state:D stack:0 pid:4294 tgid:4294 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d80 r6:83018200 r5:851a6b8c r4:84d86b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8516bc00 r8:84d86bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86b80 r8:80287e08 r7:eac99e60 r6:84572080 r5:8516bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacadfb0 to 0xeacadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8bdc0
INFO: task kworker/1:311:4294 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d89e0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:00001000 r4:dfd45000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a738c r4:851a7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a738c r4:84d86800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8516a400 r8:84d8682c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86800 r8:80287e08 r7:eacade60 r6:84572100 r5:8516a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac6dfb0 to 0xeac6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f8bfc0
INFO: task kworker/1:312:4298 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d89e0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:00001000 r4:dfeb3000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:8516e000 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8502f640
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:851d6000
r4:851d6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0005000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a778c r4:851a7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a778c r4:84d86d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d6000 r8:84d86d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86d00 r8:80287e08 r7:eac6de60 r6:84572180 r5:851d6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacb9fb0 to 0xeacb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84585240
INFO: task kworker/1:314:4303 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d9658000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r5:84e5378c r4:84e53400
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84d86d80 r8:80287e08 r7:eacb9e60 r6:84572200 r5:85169800
r4:84585380
Call trace:
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:316:4306 blocked for more than 460 seconds.
r4:851d8c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08
r5:00001000 r4:e004f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84d86b00 r8:80287e08 r7:eacbde60 r6:84572300 r5:851d8c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84585380
INFO: task kworker/1:316:4306 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d9b00000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:317:4307 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:317 state:D stack:0 pid:4307 tgid:4307 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:851d9800
r4:851d9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e046d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851a7f8c r4:851a7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851a7f8c r4:84d86e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d9800 r8:84d86eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d86e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d86e80 r8:80287e08 r7:eacbde60 r6:84572380 r5:851d9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacc9fb0 to 0xeacc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845851c0
INFO: task kworker/1:317:4307 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: da195000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:eacd1d84 r8:00000002 r7:60000013 r6:eacd1d8c r5:851db000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851ac78c r4:851ac400
r7:ddde2d80 r6:83018200 r5:851ac78c r4:84d86f00
r4:84d86f00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfeb3000
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:320:4315 blocked for more than 460 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:320 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaca5d84 r8:00000002 r7:60000113 r6:eaca5d8c r5:851d8000
r4:851d8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851d8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585d40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0663000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851ad38c r4:851ad000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851ad38c r4:84dedb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851d8000 r8:84dedbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dedb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dedb80 r8:80287e08 r7:eacd9e60 r6:84572500 r5:851d8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaca5fb0 to 0xeaca5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84585600
INFO: task kworker/1:320:4315 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: db15c000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:851dc800 r8:845726ac r7:82804d40 r6:dddced80 r5:dddceda0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:279 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac65d84 r8:00000002 r7:60000013 r6:eac65d8c r5:851dd400
r4:851dd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851dd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac65e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e100
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf31000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514bb8c r4:8514b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514bb8c r4:84572700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851dd400 r8:8457272c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84572700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84572700 r8:80287e08 r7:eacd5e60 r6:84572580 r5:851dd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac65fb0 to 0xeac65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:843e4300
INFO: task kworker/0:279:4319 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dbac1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
task:kworker/0:280 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
1d20: dbcad000 eca77000 00000001 80239b98 7f035000 00000001
r4:00000000
r5:00001000 r4:dfeb3000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:281 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:851dec00
r4:851dec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851dec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54080
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:851dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadc7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514a78c r4:8514a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514a78c r4:84572880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851dec00 r8:845728ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84572880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84572880 r8:80287e08 r7:eac65e60 r6:84572900 r5:851dec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacddfb0 to 0xeacddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:843e4300
INFO: task kworker/0:281:4321 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dc203000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:321:4323 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:321 state:D stack:0 pid:4323 tgid:4323 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eace9d84 r8:00000002 r7:60000113 r6:eace9d8c r5:851dbc00
r4:851dbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851dbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84585e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0701000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851ad78c r4:851ad400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851ad78c r4:8503ce80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851dbc00 r8:8503ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8503ce80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8503ce80 r8:80287e08 r7:eaca5e60 r6:84572980 r5:851dbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace9fb0 to 0xeace9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84585a40
INFO: task kworker/1:321:4323 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dc203000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:322 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08
r5:00001000 r4:e071d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeacf5fb0 to 0xeacf5ff8)
r4:84585e40
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851ae38c r4:851ae000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851ae38c r4:84df2180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f7a400 r8:84df21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2180 r8:80287e08 r7:eacf5e60 r6:84572a80 r5:84f7a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacfdfb0 to 0xeacfdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84585e80
INFO: task kworker/1:323:4328 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dc6a6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84f78000 r8:84df212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:325:4332 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:325 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead09d84 r8:00000002 r7:60000013 r6:ead09d8c r5:84f79800
r4:84f79800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f79800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f79800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48a1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851aef8c r4:851aec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851aef8c r4:84df2200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f79800 r8:84df222c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2200 r8:80287e08 r7:eacfde60 r6:84572b80 r5:84f79800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead09fb0 to 0xead09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e09e80
INFO: task kworker/1:325:4332 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dca8a000 eca77000 00000001 80239b98 7f035000 00000001
r4:dffe1dc0
r5:84e5378c r4:84e53400
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:84f7bc00 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:e0837000
r5:851ae78c r4:851ae400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f7bc00 r8:84df232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2300 r8:80287e08 r7:ead09e60 r6:84572c00 r5:84f7bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead0dfb0 to 0xead0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8502f980
INFO: task kworker/1:326:4333 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dca8a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:327:4336 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:327 state:D stack:0 pid:4336 tgid:4336 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead11d84 r8:00000002 r7:60000013 r6:ead11d8c r5:84f7c800
r4:84f7c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f7c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead11e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851aeb8c r4:851ae800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84df2080 r8:80287e08 r7:ead09e60 r6:84572c80 r5:84f7c800
INFO: task kworker/1:327:4336 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d20: dcea3000 eca77000 00000001 80239b98 7f035000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84f7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
r5:851af38c r4:851af000
r10:61c88647 r9:84f7d400 r8:84df23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
INFO: task kworker/1:328:4337 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d20: dcea3000 eca77000 00000001 80239b98 7f035000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8957000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851af78c r4:851af400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851af78c r4:84df2480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f7e000 r8:84df24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2480 r8:80287e08 r7:ead15e60 r6:84572d80 r5:84f7e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead19fb0 to 0xead19ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc2480
INFO: task kworker/1:329:4340 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dd211000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:330:4342 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:330 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:84f7ec00
r4:84f7ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f7ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r9:83018205 r8:84f7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
r5:851afb8c r4:851af800
r10:61c88647 r9:84f7ec00 r8:84df252c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dd34d000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08
r9:83018205 r8:84f7b000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
r5:851aff8c r4:851afc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead21fb0 to 0xead21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc2700
INFO: task kworker/1:331:4344 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dd5cc000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:332:4346 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:332 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:ead25d84 r8:00000002 r7:60000113 r6:ead25d8c r5:85168000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r9:83018205 r8:85168000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
r5:851b038c r4:851b0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b038c r4:84df2580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85168000 r8:84df25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
5fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:333:4348 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:333 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead29d84 r8:00000002 r7:60000113 r6:ead29d8c r5:851e0000
r4:851e0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead29e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2ac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b078c r4:851b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b078c r4:84df2680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e0000 r8:84df26ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2680 r8:80287e08 r7:ead25e60 r6:84572f80 r5:851e0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead29fb0 to 0xead29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc2440
INFO: task kworker/1:333:4348 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dd8a2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:334:4350 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:334 state:D stack:0 pid:4350 tgid:4350 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eabb9d84 r8:00000002 r7:60000013 r6:eabb9d8c r5:851e0c00
r4:851e0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b0b8c r4:851b0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b0b8c r4:84df2700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e0c00 r8:84df272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2700 r8:80287e08 r7:ead29e60 r6:84e16000 r5:851e0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeabb9fb0 to 0xeabb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc2a00
INFO: task kworker/1:334:4350 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ddb34000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:335:4352 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:335 state:D stack:0 pid:4352 tgid:4352 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:85176c00
r4:85176c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85176c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2d40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85176c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfc29000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b0f8c r4:851b0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b0f8c r4:84df2780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85176c00 r8:84df27ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2780 r8:80287e08 r7:eabb9e60 r6:84df2800 r5:85176c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeace5fb0 to 0xeace5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc2a00
INFO: task kworker/1:335:4352 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ddd6d000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:336:4354 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:336 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:85105400
r4:85105400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85105400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac09e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dc2f80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85105400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfde5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b138c r4:851b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b138c r4:84df2880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85105400 r8:84df28ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2880 r8:80287e08 r7:eace5e60 r6:84df2600 r5:85105400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac09fb0 to 0xeac09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc25c0
INFO: task kworker/1:336:4354 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ddff7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc6-syzkaller #0
r4:85178000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85178000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfee5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b178c r4:851b1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b178c r4:84df2400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85178000 r8:84df242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2400 r8:80287e08 r7:eac09e60 r6:84df2a00 r5:85178000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac69fb0 to 0xeac69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dc2f40
INFO: task kworker/1:337:4356 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: de050000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:338:4358 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:338 state:D stack:0 pid:4358 tgid:4358 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eac79d84 r8:00000002 r7:60000113 r6:eac79d8c r5:85179800
r4:85179800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85179800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845813c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85179800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e00af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b1b8c r4:851b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b1b8c r4:84df2900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85179800 r8:84df292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2900 r8:80287e08 r7:eac69e60 r6:84df2b00 r5:85179800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeac79fb0 to 0xeac79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581080
INFO: task kworker/1:338:4358 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: de518000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:339:4361 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:339 state:D stack:0 pid:4361 tgid:4361 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead31d84 r8:00000002 r7:60000113 r6:ead31d8c r5:85178c00
r4:85178c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85178c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85178c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0109000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b1f8c r4:851b1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b1f8c r4:84df2980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85178c00 r8:84df29ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2980 r8:80287e08 r7:eac79e60 r6:84df2c00 r5:85178c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead31fb0 to 0xead31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581380
INFO: task kworker/1:339:4361 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: de89e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:340:4363 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:340 state:D stack:0 pid:4363 tgid:4363 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eacedd84 r8:00000002 r7:60000113 r6:eacedd8c r5:8517b000
r4:8517b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b278c r4:851b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b278c r4:84df2a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517b000 r8:84df2aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2a80 r8:80287e08 r7:ead31e60 r6:84df2c80 r5:8517b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeacedfb0 to 0xeacedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581700
INFO: task kworker/1:340:4363 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dec17000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:341:4365 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:341 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead35d84 r8:00000002 r7:60000013 r6:ead35d8c r5:8517bc00
r4:8517bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0141000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b238c r4:851b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b238c r4:84df2d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517bc00 r8:84df2dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2d80 r8:80287e08 r7:eacede60 r6:84df2e00 r5:8517bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead35fb0 to 0xead35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581540
INFO: task kworker/1:341:4365 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: df0cb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:342:4367 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:342 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead39d84 r8:00000002 r7:60000113 r6:ead39d8c r5:8517c800
r4:8517c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead39e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845818c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b2b8c r4:851b2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b2b8c r4:84df2f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517c800 r8:84df2f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2f00 r8:80287e08 r7:eacede60 r6:84df2b80 r5:8517c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead39fb0 to 0xead39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845819c0
INFO: task kworker/1:342:4367 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: df0cb000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:343:4370 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:343 state:D stack:0 pid:4370 tgid:4370 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead3dd84 r8:00000002 r7:60000113 r6:ead3dd8c r5:8517d400
r4:8517d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e892f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b2f8c r4:851b2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b2f8c r4:84df2f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517d400 r8:84df2fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2f80 r8:80287e08 r7:ead39e60 r6:84df2d00 r5:8517d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead3dfb0 to 0xead3dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581800
INFO: task kworker/1:343:4370 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: df511000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:344:4371 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:344 state:D stack:0 pid:4371 tgid:4371 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead41d84 r8:00000002 r7:60000013 r6:ead41d8c r5:8517e000
r4:8517e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead41e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8977000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b338c r4:851b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b338c r4:84dedf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517e000 r8:84dedf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dedf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dedf00 r8:80287e08 r7:ead3de60 r6:84d86c80 r5:8517e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead41fb0 to 0xead41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581cc0
INFO: task kworker/1:344:4371 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: df511000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:345:4373 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:345 state:D stack:0 pid:4373 tgid:4373 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead49d84 r8:00000002 r7:60000013 r6:ead49d8c r5:8517a400
r4:8517a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead49e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84581ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea999000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b378c r4:851b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b378c r4:84deb080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517a400 r8:84deb0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb080 r8:80287e08 r7:ead41e60 r6:84deb000 r5:8517a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead49fb0 to 0xead49ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581940
INFO: task kworker/1:345:4373 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: df7b7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:346:4375 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:346 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead4dd84 r8:00000002 r7:60000113 r6:ead4dd8c r5:85174800
r4:85174800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85174800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85174800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b3b8c r4:851b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b3b8c r4:84deb100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85174800 r8:84deb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb100 r8:80287e08 r7:ead49e60 r6:84deb280 r5:85174800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead4dfb0 to 0xead4dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84581d80
INFO: task kworker/1:346:4375 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dfc2f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:347:4377 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:347 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead51d84 r8:00000002 r7:60000013 r6:ead51d8c r5:85170c00
r4:85170c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85170c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead51e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d91c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85170c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851b3f8c r4:851b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851b3f8c r4:84deb180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85170c00 r8:84deb1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb180 r8:80287e08 r7:ead4de60 r6:84deb300 r5:85170c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead51fb0 to 0xead51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d92c0
INFO: task kworker/1:347:4377 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dff8f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:348:4379 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:348 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:85180000
r4:85180000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85180000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d93c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85180000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9eb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bc38c r4:851bc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bc38c r4:84deb380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85180000 r8:84deb3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb380 r8:80287e08 r7:ead51e60 r6:84deb480 r5:85180000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead45fb0 to 0xead45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9180
INFO: task kworker/1:348:4379 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: dff8f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:349:4381 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:349 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead55d84 r8:00000002 r7:60000013 r6:ead55d8c r5:85180c00
r4:85180c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85180c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85180c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaab3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bcb8c r4:851bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bcb8c r4:84deb200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85180c00 r8:84deb22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb200 r8:80287e08 r7:ead45e60 r6:84deb580 r5:85180c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead55fb0 to 0xead55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9380
INFO: task kworker/1:349:4381 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e0426000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:350:4383 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:350 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead59d84 r8:00000002 r7:60000113 r6:ead59d8c r5:85181800
r4:85181800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85181800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85181800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa0d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bc78c r4:851bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bc78c r4:84deb400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85181800 r8:84deb42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb400 r8:80287e08 r7:ead55e60 r6:84deb680 r5:85181800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead59fb0 to 0xead59ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9500
INFO: task kworker/1:350:4383 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e0426000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:351:4385 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:351 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead5dd84 r8:00000002 r7:60000013 r6:ead5dd8c r5:85182400
r4:85182400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85182400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85182400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaac9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bcf8c r4:851bcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bcf8c r4:84deb500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85182400 r8:84deb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb500 r8:80287e08 r7:ead55e60 r6:84deb700 r5:85182400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead5dfb0 to 0xead5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9680
INFO: task kworker/1:351:4385 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e08f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:352:4387 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:352 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:85183c00
r4:85183c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85183c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9c80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85183c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bd78c r4:851bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bd78c r4:84deb600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85183c00 r8:84deb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb600 r8:80287e08 r7:ead5de60 r6:84deb880 r5:85183c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead65fb0 to 0xead65ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9840
INFO: task kworker/1:352:4387 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e0d6e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:353:4389 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:353 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000113 r6:ead6dd8c r5:851e3c00
r4:851e3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9b00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaae1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bd38c r4:851bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bd38c r4:84deb780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e3c00 r8:84deb7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb780 r8:80287e08 r7:ead65e60 r6:84e16080 r5:851e3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead6dfb0 to 0xead6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9c00
INFO: task kworker/1:353:4389 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e1125000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:354:4391 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:354 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead75d84 r8:00000002 r7:60000113 r6:ead75d8c r5:851e1800
r4:851e1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9d40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabdb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bdb8c r4:851bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bdb8c r4:84deb980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e1800 r8:84deb9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb980 r8:80287e08 r7:ead65e60 r6:84e16200 r5:851e1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead75fb0 to 0xead75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9c40
INFO: task kworker/1:354:4391 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e1125000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:355:4393 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:355 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead7dd84 r8:00000002 r7:60000113 r6:ead7dd8c r5:851e6000
r4:851e6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabe9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bdf8c r4:851bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bdf8c r4:84deb900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e6000 r8:84deb92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb900 r8:80287e08 r7:ead75e60 r6:84e16100 r5:851e6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead7dfb0 to 0xead7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9c00
INFO: task kworker/1:355:4393 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e15f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:356:4394 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:356 state:D stack:0 pid:4394 tgid:4394 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead81d84 r8:00000002 r7:60000113 r6:ead81d8c r5:851e4800
r4:851e4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d9680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabf7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851be38c r4:851be000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851be38c r4:84deba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e4800 r8:84deba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deba00 r8:80287e08 r7:ead7de60 r6:84e16180 r5:851e4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead81fb0 to 0xead81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d9c00
INFO: task kworker/1:356:4394 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e15f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:357:4397 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:357 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead8dd84 r8:00000002 r7:60000113 r6:ead8dd8c r5:851e5400
r4:851e5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac55000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851beb8c r4:851be800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851beb8c r4:84deb800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e5400 r8:84deb82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deb800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deb800 r8:80287e08 r7:ead81e60 r6:84e16280 r5:851e5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead8dfb0 to 0xead8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84c27d40
INFO: task kworker/1:357:4397 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e15f1000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:358:4399 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:358 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:851e2400
r4:851e2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac01000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851be78c r4:851be400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851be78c r4:84debb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e2400 r8:84debb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84debb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84debb00 r8:80287e08 r7:ead8de60 r6:84e16300 r5:851e2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead95fb0 to 0xead95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2240
INFO: task kworker/1:358:4399 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e1e8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:359:4401 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:359 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:8517ec00
r4:8517ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8517ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e22c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8517ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bef8c r4:851bec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bef8c r4:84deba80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8517ec00 r8:84debaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84deba80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84deba80 r8:80287e08 r7:ead8de60 r6:84e16380 r5:8517ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead9dfb0 to 0xead9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2240
INFO: task kworker/1:359:4401 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e1e8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:360:4404 blocked for more than 461 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:360 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eada9d84 r8:00000002 r7:60000013 r6:eada9d8c r5:84f28c00
r4:84f28c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f28c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2400
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac7d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bf38c r4:851bf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bf38c r4:84debc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f28c00 r8:84debc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84debc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84debc00 r8:80287e08 r7:ead9de60 r6:84e16400 r5:84f28c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada9fb0 to 0xeada9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2280
INFO: task kworker/1:360:4404 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e1e8e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:361:4405 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:361 state:D stack:0 pid:4405 tgid:4405 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadadd84 r8:00000002 r7:60000113 r6:eadadd8c r5:84f29800
r4:84f29800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f29800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f29800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac8d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bf78c r4:851bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bf78c r4:84debc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f29800 r8:84debcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84debc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84debc80 r8:80287e08 r7:eada9e60 r6:84e16480 r5:84f29800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadadfb0 to 0xeadadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2280
INFO: task kworker/1:361:4405 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e22ce000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:362:4407 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:362 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:85184800
r4:85184800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85184800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85184800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bfb8c r4:851bf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bfb8c r4:84debd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85184800 r8:84debd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84debd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84debd00 r8:80287e08 r7:eadade60 r6:84debd80 r5:85184800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead61fb0 to 0xead61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2340
INFO: task kworker/1:362:4407 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e261f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:363:4409 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:363 state:D stack:0 pid:4409 tgid:4409 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead69d84 r8:00000002 r7:60000013 r6:ead69d8c r5:85185400
r4:85185400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85185400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2a40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85185400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523438c r4:85234000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523438c r4:84debe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85185400 r8:84debe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84debe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84debe00 r8:80287e08 r7:ead61e60 r6:84debb80 r5:85185400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xead69fb0 to 0xead69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2340
INFO: task kworker/1:363:4409 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e294a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:364:4411 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:364 state:D stack:0 pid:4411 tgid:4411 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadb5d84 r8:00000002 r7:60000013 r6:eadb5d8c r5:85186c00
r4:85186c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85186c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85186c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:851bff8c r4:851bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:851bff8c r4:84df2e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85186c00 r8:84df2eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84df2e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df2e80 r8:80287e08 r7:ead69e60 r6:84debe80 r5:85186c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb5fb0 to 0xeadb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2840
INFO: task kworker/1:364:4411 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e294a000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:365:4413 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:365 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadc1d84 r8:00000002 r7:60000113 r6:eadc1d8c r5:84f2a400
r4:84f2a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadbd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523478c r4:85234400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523478c r4:84d53000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2a400 r8:84d5302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53000 r8:80287e08 r7:ead69e60 r6:84e16500 r5:84f2a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadc1fb0 to 0xeadc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2a00
INFO: task kworker/1:365:4413 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e2aec000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:366:4415 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:366 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000013 r6:eadb1d8c r5:84f2b000
r4:84f2b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e128c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eade5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85234f8c r4:85234c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85234f8c r4:84d53080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2b000 r8:84d530ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53080 r8:80287e08 r7:eadc1e60 r6:84e16580 r5:84f2b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadb1fb0 to 0xeadb1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2980
INFO: task kworker/1:366:4415 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e2dd2000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:282:4418 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:282 state:D stack:0 pid:4418 tgid:4418 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadd1d84 r8:00000002 r7:60000113 r6:eadd1d8c r5:84f2bc00
r4:84f2bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d541c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84f2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514ab8c r4:8514a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514ab8c r4:84e16700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2bc00 r8:84e1672c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e16700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e16700 r8:80287e08 r7:eac65e60 r6:84e16780 r5:84f2bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd1fb0 to 0xeadd1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d542c0
INFO: task kworker/0:282:4418 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e3351000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:367:4419 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:367 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadddd84 r8:00000002 r7:60000013 r6:eadddd8c r5:84f2c800
r4:84f2c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaddde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaddf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85234b8c r4:85234800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85234b8c r4:84d53200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2c800 r8:84d5322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53200 r8:80287e08 r7:eadb1e60 r6:84e16600 r5:84f2c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadddfb0 to 0xeadddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2e00
INFO: task kworker/1:367:4419 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e3351000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:283:4421 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:283 state:D stack:0 pid:4421 tgid:4421 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eade9d84 r8:00000002 r7:60000113 r6:eade9d8c r5:84f2d400
r4:84f2d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84f2d400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfd17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514b38c r4:8514b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514b38c r4:84e16680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2d400 r8:84e166ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e16680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e16680 r8:80287e08 r7:eac65e60 r6:84e16800 r5:84f2d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeade9fb0 to 0xeade9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d54100
INFO: task kworker/0:283:4421 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e3351000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:368:4423 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:368 state:D stack:0 pid:4423 tgid:4423 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadf1d84 r8:00000002 r7:60000113 r6:eadf1d8c r5:84f2e000
r4:84f2e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0029000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523578c r4:85235400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523578c r4:84d53100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2e000 r8:84d5312c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53100 r8:80287e08 r7:eadb1e60 r6:84e16880 r5:84f2e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf1fb0 to 0xeadf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e12cc0
INFO: task kworker/1:368:4423 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e363e000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:369:4424 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:369 state:D stack:0 pid:4424 tgid:4424 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadf5d84 r8:00000002 r7:60000013 r6:eadf5d8c r5:84f2ec00
r4:84f2ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f2ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e2f80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:df9e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523538c r4:85235000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523538c r4:84d53280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f2ec00 r8:84d532ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53280 r8:80287e08 r7:eadf1e60 r6:84e16900 r5:84f2ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf5fb0 to 0xeadf5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e2fc0
INFO: task kworker/1:369:4424 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e39b4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:370:4429 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:370 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:84f28000
r4:84f28000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f28000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f28000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0465000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85235b8c r4:85235800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85235b8c r4:84d53380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f28000 r8:84d533ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53380 r8:80287e08 r7:eadf1e60 r6:84e16980 r5:84f28000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadd9fb0 to 0xeadd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0000
INFO: task kworker/1:370:4429 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e3b27000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:371:4431 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:371 state:D stack:0 pid:4431 tgid:4431 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:85183000
r4:85183000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85183000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0280
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85183000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85235f8c r4:85235c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85235f8c r4:84d53400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85183000 r8:84d5342c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53400 r8:80287e08 r7:eadd9e60 r6:84d53180 r5:85183000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadfdfb0 to 0xeadfdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e01c0
INFO: task kworker/1:371:4431 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e3b27000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:372:4434 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:372 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae01d84 r8:00000002 r7:60000113 r6:eae01d8c r5:85186000
r4:85186000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85186000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85186000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523638c r4:85236000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523638c r4:84d53480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85186000 r8:84d534ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53480 r8:80287e08 r7:eadfde60 r6:84d53580 r5:85186000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae01fb0 to 0xeae01ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e02c0
INFO: task kworker/1:372:4434 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e4126000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:284:4435 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:284 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae09d84 r8:00000002 r7:60000113 r6:eae09d8c r5:852b0c00
r4:852b0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:852b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8514b78c r4:8514b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8514b78c r4:84e16a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b0c00 r8:84e16aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e16a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e16a80 r8:80287e08 r7:eac65e60 r6:84e16b00 r5:852b0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae09fb0 to 0xeae09ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d54880
INFO: task kworker/0:284:4435 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e4126000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:373:4436 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:373 state:D stack:0 pid:4436 tgid:4436 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae0dd84 r8:00000002 r7:60000113 r6:eae0dd8c r5:852b1800
r4:852b1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0559000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523678c r4:85236400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523678c r4:84d53300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b1800 r8:84d5332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53300 r8:80287e08 r7:eae01e60 r6:84e16a00 r5:852b1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae0dfb0 to 0xeae0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0700
INFO: task kworker/1:373:4436 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e4679000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:374:4438 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:374 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:852b3000
r4:852b3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85236b8c r4:85236800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85236b8c r4:84d53680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b3000 r8:84d536ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53680 r8:80287e08 r7:eae0de60 r6:84e16b80 r5:852b3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae15fb0 to 0xeae15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e05c0
INFO: task kworker/1:374:4438 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e4679000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:375:4440 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:375 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:852b2400
r4:852b2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0627000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85236f8c r4:85236c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85236f8c r4:84d53780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b2400 r8:84d537ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53780 r8:80287e08 r7:eae15e60 r6:84e16c00 r5:852b2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae1dfb0 to 0xeae1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0740
INFO: task kworker/1:375:4440 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e46ba000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:376:4441 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:376 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae21d84 r8:00000002 r7:60000113 r6:eae21d8c r5:852b0000
r4:852b0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae21e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0b40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0789000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523778c r4:85237400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523778c r4:84d53500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b0000 r8:84d5352c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53500 r8:80287e08 r7:eae1de60 r6:84e16c80 r5:852b0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae21fb0 to 0xeae21ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0740
INFO: task kworker/1:376:4441 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e4a9f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:377:4443 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:377 state:D stack:0 pid:4443 tgid:4443 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae29d84 r8:00000002 r7:60000113 r6:eae29d8c r5:852b5400
r4:852b5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0a00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8523738c r4:85237000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8523738c r4:84d53800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b5400 r8:84d5382c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53800 r8:80287e08 r7:eae21e60 r6:84e16d00 r5:852b5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae29fb0 to 0xeae29ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0840
INFO: task kworker/1:377:4443 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e4c36000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:378:4446 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:378 state:D stack:0 pid:4446 tgid:4446 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:852b4800
r4:852b4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e488b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527038c r4:85270000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527038c r4:84d53600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b4800 r8:84d5362c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53600 r8:80287e08 r7:eae21e60 r6:84e16d80 r5:852b4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae39fb0 to 0xeae39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0a80
INFO: task kworker/1:378:4446 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e5053000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:379:4448 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:379 state:D stack:0 pid:4448 tgid:4448 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae41d84 r8:00000002 r7:60000013 r6:eae41d8c r5:852b6c00
r4:852b6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae41e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85237b8c r4:85237800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85237b8c r4:84d53880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b6c00 r8:84d538ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53880 r8:80287e08 r7:eae39e60 r6:84e16e00 r5:852b6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae41fb0 to 0xeae41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0c00
INFO: task kworker/1:379:4448 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e5150000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:380:4449 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:380 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae45d84 r8:00000002 r7:60000113 r6:eae45d8c r5:852b6000
r4:852b6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852b6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e0dc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e083f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85237f8c r4:85237c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85237f8c r4:84d53980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852b6000 r8:84d539ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53980 r8:80287e08 r7:eae39e60 r6:84e16e80 r5:852b6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae45fb0 to 0xeae45ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e0c00
INFO: task kworker/1:380:4449 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e55a4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:8527178c r4:85271400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84d53a00 r8:80287e08 r7:eae39e60 r6:84e16f00 r5:851e6c00
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08
r5:8527078c r4:85270400
r10:61c88647 r9:84f00c00 r8:84d5392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d54f80
INFO: task kworker/1:382:4454 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e55a4000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:383:4455 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:383 state:D stack:0 pid:4455 tgid:4455 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:84f01800
r4:84f01800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f01800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d54dc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f01800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8969000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85270b8c r4:85270800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85270b8c r4:84d53a80
r4:00000001
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e59ae000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:84e5378c r4:84e53400
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:384:4457 blocked for more than 462 seconds.
r5:84f00000 r4:8291a680
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63000
r5:85270f8c r4:85270c00
r7:ddde2d80 r6:83018200 r5:85270f8c r4:84d53b00
r4:00000001
r4:847e0f80
Call trace:
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r5:84f02400 r4:8291a680
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84d53c00
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:386:4461 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:386 state:D stack:0 pid:4461 tgid:4461 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae79d84 r8:00000002 r7:60000113 r6:eae79d8c r5:84f03c00
r4:84f03c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f03c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae79e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f03c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527278c r4:85272400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527278c r4:84d53b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f03c00 r8:84d53bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53b80 r8:80287e08 r7:eae4de60 r6:84f67180 r5:84f03c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae79fb0 to 0xeae79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f632c0
INFO: task kworker/1:386:4461 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e5fa5000 eca77000 00000001 80239b98 7f035000 00000001
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r5:84e5378c r4:84e53400
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r5:84f04800 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:85271b8c r4:85271800
r7:ddde2d80 r6:83018200 r5:85271b8c r4:84d53d00
Exception stack(0xeae7dfb0 to 0xeae7dff8)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f63540
INFO: task kworker/1:387:4463 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e6206000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:388:4465 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:388 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae85d84 r8:00000002 r7:60000113 r6:eae85d8c r5:84f06000
r5:84f06000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f634c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f06000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaccd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85271f8c r4:85271c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85271f8c r4:84d53d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f06000 r8:84d53dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53d80 r8:80287e08 r7:eae79e60 r6:84f67280 r5:84f06000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae85fb0 to 0xeae85ff8)
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r5:85238000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d80 r6:83018200 r5:8527238c r4:84d53e00
r10:61c88647 r9:85238000 r8:84d53e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53e00 r8:80287e08 r7:eae79e60 r6:84d53e80 r5:85238000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae05fb0 to 0xeae05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f63780
INFO: task kworker/1:389:4467 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e6264000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:390 state:D stack:0 pid:4470 tgid:4470 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08
r5:00001000 r4:eae53000
r5:85272b8c r4:85272800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:84d53c80
dfa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae91d84 r8:00000002 r7:60000113 r6:eae91d8c r5:8523a400
r4:8523a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8523a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63f40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8523a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeb7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85273b8c r4:85273800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85273b8c r4:84d53f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8523a400 r8:84d53fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d53f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d53f80 r8:80287e08 r7:eae8de60 r6:84d53700 r5:8523a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeae91fb0 to 0xeae91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f63900
INFO: task kworker/1:391:4472 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e66e7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r4:8523b000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d80 r6:83018200 r5:85272f8c r4:84d80000
r10:00000000 r9:84d80000 r8:80287e08 r7:eae91e60 r6:84d80180 r5:8523b000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:dffe1dc0
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:393:4476 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:393 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaea1d84 r8:00000002 r7:60000013 r6:eaea1d8c r5:8523bc00
r4:8523bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8523bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8523bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaea3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527338c r4:85273000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527338c r4:84d80080
r10:61c88647 r9:8523bc00 r8:84d800ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0: 00000000 00000000 00000000 00000000
r4:84f63b80
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:394:4478 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:394 state:D stack:0 pid:4478 tgid:4478 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaeb5d84 r8:00000002 r7:60000013 r6:eaeb5d8c r5:8523c800
r4:8523c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8523c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f63dc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaea9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527378c r4:85273400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527378c r4:84d80100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8523c800 r8:84d8012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80100 r8:80287e08 r7:eae91e60 r6:84d80380 r5:8523c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeb5fb0 to 0xeaeb5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f63d80
INFO: task kworker/1:394:4478 is blocked on a mutex likely owned by task kworker/0:123:3540.
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:395:4479 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:395 state:D stack:0 pid:4479 tgid:4479 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eadf9d84 r8:00000002 r7:60000013 r6:eadf9d8c r5:8523d400
r4:8523d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8523d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d0a040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8523d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaebd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85273f8c r4:85273c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85273f8c r4:84d80200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8523d400 r8:84d8022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80200 r8:80287e08 r7:eae91e60 r6:84d80300 r5:8523d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeadf9fb0 to 0xeadf9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f63d80
INFO: task kworker/1:395:4479 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:396:4482 blocked for more than 462 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:396 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaec1d84 r8:00000002 r7:60000113 r6:eaec1d8c r5:8523e000
r4:8523e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8523e000 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527c38c r4:8527c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527c38c r4:84d80400
r10:61c88647 r9:8523e000 r8:84d8042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:84d80400 r8:80287e08 r7:eadf9e60 r6:84d80580 r5:8523e000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:82ac21e4
r4:dffe1dc0
r4:00000000
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:397:4485 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:397 state:D stack:0 pid:4485 tgid:4485 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaee1d84 r8:00000002 r7:60000013 r6:eaee1d8c r5:84f05400
r4:84f05400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84f05400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d0a300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84f05400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaed1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527c78c r4:8527c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527c78c r4:84d80480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f05400 r8:84d804ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80480 r8:80287e08 r7:eaec1e60 r6:84f67300 r5:84f05400
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e74a8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Workqueue: events bpf_prog_free_deferred
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8527cb8c r4:8527c800
r4:84d80600
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d0a280
INFO: task kworker/1:398:4486 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e785b000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d87ac0
r10:8291a684 r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:84f03000
r4:00000000
r5:8527cf8c r4:8527cc00
r10:61c88647 r9:84f03000 r8:84d806ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Workqueue: events bpf_prog_free_deferred
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:84e0be80
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r5:84f06c00 r4:8291a680
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r7:ddde2d80 r6:83018200 r5:8527d38c r4:84d80780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84f06c00 r8:84d807ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80780 r8:80287e08 r7:eaef5e60 r6:84f67480 r5:84f06c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaefdfb0 to 0xeaefdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d0a5c0
INFO: task kworker/1:400:4490 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e7a61000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
r5:85260000 r4:8291a680
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527d78c r4:8527d400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
dfa0: 00000000 00000000 00000000 00000000
Call trace:
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
INFO: task kworker/1:402:4495 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:402 state:D stack:0 pid:4495 tgid:4495 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaec9d84 r8:00000002 r7:60000113 r6:eaec9d8c r5:85262400
r4:85262400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85262400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d0ae40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85262400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf3b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527db8c r4:8527d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527db8c r4:84d80700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85262400 r8:84d8072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80700 r8:80287e08 r7:eaedde60 r6:84d80980 r5:85262400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaec9fb0 to 0xeaec9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d0a900
INFO: task kworker/1:402:4495 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/0:285 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08
r9:83018005 r8:85263c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r5:842ebb8c r4:842eb800
r10:61c88647 r9:85263c00 r8:84f6752c r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:00000000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:286:4499 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:286 state:D stack:0 pid:4499 tgid:4499 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf51d84 r8:00000002 r7:60000113 r6:eaf51d8c r5:85263000
r4:85263000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85263000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458ea80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85263000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead99000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466878c r4:84668400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466878c r4:84f67600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85263000 r8:84f6762c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f67600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f67600 r8:80287e08 r7:eaf55e60 r6:84d80c00 r5:85263000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf51fb0 to 0xeaf51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8458e040
INFO: task kworker/0:286:4499 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e8364000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:403:4500 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:403 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf61d84 r8:00000002 r7:60000113 r6:eaf61d8c r5:85264800
r4:85264800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85264800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf61e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:dfd4f000
r5:8527e78c r4:8527e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85264800 r8:84d80aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r4:dffe1dc0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:85266000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:8527df8c r4:8527dc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0: 00000000 00000000 00000000 00000000
r4:84e17100
INFO: task kworker/1:404:4503 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e88e8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:405:4505 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:405 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ead85d84 r8:00000002 r7:60000013 r6:ead85d8c r5:85261800
r4:85261800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85261800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r4:00000000
r4:00000000
r5:00001000 r4:dfa0d000
r5:8527e38c r4:8527e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84d80c80 r8:80287e08 r7:eaf61e60 r6:84d80e80 r5:85261800
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eada1d84 r8:00000002 r7:60000013 r6:eada1d8c r5:8523ec00
r4:8523ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8523ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e176c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8523ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfe9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527eb8c r4:8527e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527eb8c r4:84d80d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8523ec00 r8:84d80d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80d00 r8:80287e08 r7:eaf61e60 r6:84d80f80 r5:8523ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada1fb0 to 0xeada1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e17480
INFO: task kworker/1:406:4506 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e8c67000 eca77000 00000001 80239b98 7f035000 00000001
r4:dffe1dc0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:85238c00 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527ef8c r4:84d80f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85238c00 r8:84d80f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d80f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d80f00 r8:80287e08 r7:eada1e60 r6:84d80e00 r5:85238c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf6dfb0 to 0xeaf6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e17680
INFO: task kworker/1:407:4510 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:eaf29d84 r8:00000002 r7:60000013 r6:eaf29d8c r5:85266c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf29e08
r9:83018205 r8:85266c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
r5:8527f38c r4:8527f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:409:4513 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:409 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:85265400
r4:85265400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85265400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e17ac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85265400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e066d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527f78c r4:8527f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527f78c r4:84de8100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85265400 r8:84de812c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8100 r8:80287e08 r7:eaf29e60 r6:84de8280 r5:85265400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf35fb0 to 0xeaf35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e17840
INFO: task kworker/1:409:4513 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e9284000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:8527fb8c r4:8527f800
r7:ddde2d80 r6:83018200 r5:8527fb8c r4:84de8180
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
r5:84688c00 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e17e40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84688c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e896b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8527ff8c r4:8527fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8527ff8c r4:84de8200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84688c00 r8:84de822c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8200 r8:80287e08 r7:eaf81e60 r6:84f67680 r5:84688c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf85fb0 to 0xeaf85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e17c00
INFO: task kworker/1:411:4517 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e94e9000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:412:4518 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:412 state:D stack:0 pid:4518 tgid:4518 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:84688000
r4:84688000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84688000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08
r4:00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8528438c r4:85284000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:84de8300 r8:80287e08 r7:eaf85e60 r6:84f67580 r5:84688000
r4:84e17e00
Workqueue: events bpf_prog_free_deferred
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
r5:00001000 r4:dfeb3000
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:413:4520 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:413 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf8dd84 r8:00000002 r7:60000013 r6:eaf8dd8c r5:8468a400
r4:8468a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8468a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e173c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8468a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8528478c r4:85284400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8528478c r4:84de8500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8468a400 r8:84de852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8500 r8:80287e08 r7:eaf89e60 r6:84f67700 r5:8468a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: e9a23000 eca77000 00000001 80239b98 7f035000 00000001
r4:dffe1dc0
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:414:4523 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:414 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:8468c800
r4:8468c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8468c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8468c800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85284b8c r4:85284800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85284b8c r4:84de8400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8468c800 r8:84de842c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8400 r8:80287e08 r7:eaf8de60 r6:84f67780 r5:8468c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf99fb0 to 0xeaf99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e17fc0
INFO: task kworker/1:414:4523 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e9a23000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:415:4525 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:415 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:8468bc00
r4:8468bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8468bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8468bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaa23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85284f8c r4:85284c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85284f8c r4:84de8580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8468bc00 r8:84de85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8580 r8:80287e08 r7:eaf99e60 r6:84f67800 r5:8468bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa5fb0 to 0xeafa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df3240
INFO: task kworker/1:415:4525 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: e9ed0000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:416:4527 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:416 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:8468b000
r4:8468b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8468b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8468b000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaabd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8528538c r4:85285000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8528538c r4:84de8480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8468b000 r8:84de84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8480 r8:80287e08 r7:eafa5e60 r6:84f67880 r5:8468b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafa9fb0 to 0xeafa9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df3100
INFO: task kworker/1:416:4527 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ea045000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:417:4529 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:417 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafb1d84 r8:00000002 r7:60000013 r6:eafb1d8c r5:8468d400
r4:8468d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8468d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r9:83018205 r8:8468d400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
r7:ddde2d80 r6:83018200 r5:85285b8c r4:84de8680
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ea2e7000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:418:4530 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:418 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf7dd84 r8:00000002 r7:60000113 r6:eaf7dd8c r5:85268000
r4:85268000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85268000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85268000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8528578c r4:85285400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeafb5fb0 to 0xeafb5ff8)
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:dffe1dc0
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:420:4536 blocked for more than 463 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:420 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000113 r6:eafb9d8c r5:8526b000
r4:8526b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8526b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8526b000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85285f8c r4:85285c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85285f8c r4:84de8800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8526b000 r8:84de882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8800 r8:80287e08 r7:eafb5e60 r6:84de8980 r5:8526b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafb9fb0 to 0xeafb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df3640
INFO: task kworker/1:420:4536 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: eadd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r4:00000000
r9:83018205 r8:8526bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
r7:ddde2d80 r6:83018200 r5:8528638c r4:84de8a00
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df3640
INFO: task kworker/1:421:4537 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: eadd6000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:00001000 r4:dfeb3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:8526c800 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3a00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8526c800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8528678c r4:85286400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8528678c r4:84de8a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8526c800 r8:84de8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8a80 r8:80287e08 r7:eafb5e60 r6:84de8b80 r5:8526c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc1fb0 to 0xeafc1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df39c0
INFO: task kworker/1:422:4539 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:8526d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
r7:ddde2d80 r6:83018200 r5:85286b8c r4:84de8c00
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:424 state:D stack:0 pid:4543 tgid:4543 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:8526e000
r4:8526e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8526e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3cc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8526e000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac8f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85286f8c r4:85286c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85286f8c r4:84de8b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8526e000 r8:84de8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8b00 r8:80287e08 r7:eafb5e60 r6:84de8e00 r5:8526e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafc9fb0 to 0xeafc9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84df3c80
INFO: task kworker/1:424:4543 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: eb2d5000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc6-syzkaller #0
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84df3f80
r5:8528778c r4:85287400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84debf80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:427:4548 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:427 state:D stack:0 pid:4548 tgid:4548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:85240c00
r4:85240c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85240c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850526c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadc5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529038c r4:85290000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529038c r4:84de8d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85240c00 r8:84de8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84de8d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84de8d80 r8:80287e08 r7:eafd1e60 r6:84de8e80 r5:85240c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaf91fb0 to 0xeaf91ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:00000000
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:428:4550 blocked for more than 464 seconds.
r4:85241800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:eadb9000
r5:85287f8c r4:85287c00
r4:84de8f80
Exception stack(0xeafd9fb0 to 0xeafd9ff8)
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85052180
INFO: task kworker/1:428:4550 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ec0b8000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:287:4553 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:287 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:85242400
r4:85242400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85242400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458e440
r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
r5:8529078c r4:85290400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8529078c r4:84f67980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:84f67980
r10:00000000 r9:84f67980 r8:80287e08 r7:eaf55e60 r6:85051000 r5:85242400
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:8458e440
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ec35f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:429:4556 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:429 state:D stack:0 pid:4556 tgid:4556 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafd5d84 r8:00000002 r7:60000113 r6:eafd5d8c r5:85243c00
r4:85243c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85243c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052cc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf71000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85290f8c r4:85290c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85290f8c r4:85051180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85243c00 r8:850511ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051180 r8:80287e08 r7:eaf91e60 r6:85051200 r5:85243c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafd5fb0 to 0xeafd5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85052680
INFO: task kworker/1:429:4556 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ec35f000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:430:4559 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:430 state:D stack:0 pid:4559 tgid:4559 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:85245400
r4:85245400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85245400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052b00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85245400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eade3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85290b8c r4:85290800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85290b8c r4:85051100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85245400 r8:8505112c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051100 r8:80287e08 r7:eafd5e60 r6:85051380 r5:85245400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafedfb0 to 0xeafedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85052ac0
INFO: task kworker/1:430:4559 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ec941000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:431:4561 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:431 state:D stack:0 pid:4561 tgid:4561 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:85244800
r4:85244800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85244800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85244800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529138c r4:85291000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529138c r4:85051280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85244800 r8:850512ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051280 r8:80287e08 r7:eafd5e60 r6:85051480 r5:85244800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe9fb0 to 0xeafe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85052c80
INFO: task kworker/1:431:4561 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ec941000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:288:4562 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:288 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:85246000
r4:85246000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85246000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845743c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85246000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:842eb78c r4:842eb400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:842eb78c r4:84f67a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85246000 r8:84f67a2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84f67a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84f67a00 r8:80287e08 r7:eaf55e60 r6:85051300 r5:85246000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaffdfb0 to 0xeaffdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84e03000
INFO: task kworker/0:288:4562 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ec941000 eca77000 00000001 80239b98 7f035000 00000001
1d40: 82ac15a0 7f035000 eca77000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 800f0013 ffffffff
r5:800f0013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfa040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfeb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84e5378c r4:84e53400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84e5378c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:432:4564 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:432 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85246c00
r4:85246c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85246c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85052780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529178c r4:85291400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529178c r4:85051580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85246c00 r8:850515ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051580 r8:80287e08 r7:eafe9e60 r6:85051400 r5:85246c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeafe1fb0 to 0xeafe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85052d40
INFO: task kworker/1:432:4564 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 7f483000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 90070013 ffffffff
r5:90070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:85240000
r4:85240000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85240000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85240000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
r5:85291b8c r4:85291800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:850520c0
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r5:00001000 r4:dfa13000
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08
r5:00001000 r4:dfadb000
r5:85291f8c r4:85291c00
r4:85051600
Exception stack(0xeae81fb0 to 0xeae81ff8)
Workqueue: events bpf_prog_free_deferred
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:435 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eaeadd84 r8:00000002 r7:60000013 r6:eaeadd8c r5:8468ec00
r4:8468ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8468ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d82c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8468ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfff1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529238c r4:85292000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529238c r4:85051780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8468ec00 r8:850517ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051780 r8:80287e08 r7:eae81e60 r6:84f67b00 r5:8468ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeaeadfb0 to 0xeaeadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:85ef9f8c r4:85ef9c00
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:436:4572 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:436 state:D stack:0 pid:4572 tgid:4572 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:84398000
r4:84398000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84398000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb00de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84398000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529338c r4:85293000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529338c r4:85051800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84398000 r8:8505182c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051800 r8:80287e08 r7:eaeade60 r6:84f67b80 r5:84398000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb00dfb0 to 0xeb00dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8140
INFO: task kworker/1:436:4572 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 7fa10000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 90070013 ffffffff
r5:90070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:437 state:D stack:0 pid:4573 tgid:4573 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84398c00 r8:850518ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:438:4575 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:438 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb019d84 r8:00000002 r7:60000013 r6:eb019d8c r5:8439a400
r4:8439a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8439a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8439a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04f1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85292b8c r4:85292800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85292b8c r4:85051980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8439a400 r8:850519ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051980 r8:80287e08 r7:eb00de60 r6:84f67c80 r5:8439a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb019fb0 to 0xeb019ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8340
INFO: task kworker/1:438:4575 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 7fd25000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 90070013 ffffffff
r5:90070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:439:4577 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
Workqueue: events bpf_prog_free_deferred
r4:8439bc00
r5:8439bc00 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d86c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8439bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e057f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85292f8c r4:85292c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85292f8c r4:85051a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8439bc00 r8:85051a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051a00 r8:80287e08 r7:eb00de60 r6:84f67d00 r5:8439bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb029fb0 to 0xeb029ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8540
INFO: task kworker/1:439:4577 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 80111000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:8439b000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r9:83018205 r8:8439b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
r5:8529378c r4:85293400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529378c r4:85051a80
r10:61c88647 r9:8439b000 r8:85051aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051a80 r8:80287e08 r7:eb00de60 r6:84f67d80 r5:8439b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb035fb0 to 0xeb035ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d88c0
INFO: task kworker/1:440:4580 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8049f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:441:4583 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:441 state:D stack:0 pid:4583 tgid:4583 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:8439c800
r4:8439c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8439c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8a40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8439c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e07e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85293b8c r4:85293800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85293b8c r4:85051b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8439c800 r8:85051b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051b00 r8:80287e08 r7:eb035e60 r6:84f67e00 r5:8439c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb041fb0 to 0xeb041ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8940
INFO: task kworker/1:441:4583 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:442:4584 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:442 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:8439e000
r4:8439e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8439e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c4c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8439e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85299b8c r4:85299800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85299b8c r4:85051900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8439e000 r8:8505192c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051900 r8:80287e08 r7:eb041e60 r6:84f67e80 r5:8439e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb045fb0 to 0xeb045ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8940
INFO: task kworker/1:442:4584 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:443:4586 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:443 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:8439d400
r4:8439d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8439d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8439d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e086c000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85293f8c r4:85293c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85293f8c r4:85051b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8439d400 r8:85051bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051b80 r8:80287e08 r7:eb045e60 r6:84f67f00 r5:8439d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb04dfb0 to 0xeb04dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8c80
INFO: task kworker/1:443:4586 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:444:4587 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:444 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:84399800
r4:84399800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84399800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84399800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8931000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529838c r4:85298000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529838c r4:85051c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84399800 r8:85051cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051c80 r8:80287e08 r7:eb045e60 r6:84f67f80 r5:84399800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb051fb0 to 0xeb051ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8bc0
INFO: task kworker/1:444:4587 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 80e4d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:445:4589 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:445 state:D stack:0 pid:4589 tgid:4589 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb059d84 r8:00000002 r7:60000013 r6:eb059d8c r5:8439ec00
r4:8439ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8439ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8439ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab05000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529878c r4:85298400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529878c r4:85051d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8439ec00 r8:85051d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051d00 r8:80287e08 r7:eb045e60 r6:8505e000 r5:8439ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb059fb0 to 0xeb059ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8f00
INFO: task kworker/1:445:4589 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 811b8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:446:4591 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:446 state:D stack:0 pid:4591 tgid:4591 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb061d84 r8:00000002 r7:60000013 r6:eb061d8c r5:851e3000
r4:851e3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:851e3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d8f80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:851e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab21000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85298b8c r4:85298800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85298b8c r4:85051d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:851e3000 r8:85051dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051d80 r8:80287e08 r7:eb045e60 r6:8505e080 r5:851e3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb061fb0 to 0xeb061ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847d8fc0
INFO: task kworker/1:446:4591 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 81696000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:447:4593 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:447 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:85248c00
r4:85248c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85248c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85248c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab8b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85298f8c r4:85298c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85298f8c r4:85051e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85248c00 r8:85051e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051e00 r8:80287e08 r7:eb045e60 r6:8505e100 r5:85248c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb069fb0 to 0xeb069ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:844d7b00
INFO: task kworker/1:447:4593 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 81696000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:448:4595 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:448 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eafddd84 r8:00000002 r7:60000013 r6:eafddd8c r5:85243000
r4:85243000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85243000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c140
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:8529938c r4:85299000
r7:ddde2d80 r6:83018200 r5:8529938c r4:85051680
r10:00000000 r9:85051680 r8:80287e08 r7:eb045e60 r6:85051e80 r5:85243000
r4:8505c240
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:450:4600 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:450 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb075d84 r8:00000002 r7:60000013 r6:eb075d8c r5:85250c00
r4:85250c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85250c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85250c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529a38c r4:8529a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529a38c r4:85063080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85250c00 r8:850630ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063080 r8:80287e08 r7:eb045e60 r6:85063000 r5:85250c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb075fb0 to 0xeb075ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505c080
INFO: task kworker/1:450:4600 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 81e84000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
r5:85253000 r4:8291a680
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:85063100
Exception stack(0xeb079fb0 to 0xeb079ff8)
r4:8505c6c0
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r4:dffe1dc0
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:452:4604 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:452 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:85253c00
r4:85253c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85253c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505cb00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85253c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529a78c r4:8529a400
r7:ddde2d80 r6:83018200 r5:8529a78c r4:85063180
Exception stack(0xeae31fb0 to 0xeae31ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eae51000
r5:8529ab8c r4:8529a800
r10:61c88647 r9:8524a400 r8:8506322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:82ac21e4
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:454:4608 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:454 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb08dd84 r8:00000002 r7:60000013 r6:eb08dd8c r5:8524bc00
r4:8524bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8524bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505cd40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8524bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529af8c r4:8529ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529af8c r4:85063400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8524bc00 r8:8506342c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063400 r8:80287e08 r7:eb085e60 r6:8505e200 r5:8524bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb08dfb0 to 0xeb08dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505cbc0
INFO: task kworker/1:454:4608 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 827ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:455:4610 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:455 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:85249800
r4:85249800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85249800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85249800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529b78c r4:8529b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529b78c r4:85063480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85249800 r8:850634ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063480 r8:80287e08 r7:eb08de60 r6:8505e280 r5:85249800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb091fb0 to 0xeb091ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505cc80
INFO: task kworker/1:455:4610 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 827ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:8529b38c r4:8529b000
r10:61c88647 r9:8524c800 r8:850635ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
r4:8524ec00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8524ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaea7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529bb8c r4:8529b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529bb8c r4:85063300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8524ec00 r8:8506332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063300 r8:80287e08 r7:eb091e60 r6:8505e380 r5:8524ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a1fb0 to 0xeb0a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85061240
INFO: task kworker/1:457:4615 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 82d35000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:458:4616 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:458 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0a9d84 r8:00000002 r7:60000013 r6:eb0a9d8c r5:85248000
r4:85248000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85248000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850612c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85248000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeb9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529bf8c r4:8529bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529bf8c r4:85063500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85248000 r8:8506352c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063500 r8:80287e08 r7:eb0a1e60 r6:8505e400 r5:85248000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0a9fb0 to 0xeb0a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850613c0
INFO: task kworker/1:458:4616 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 82d35000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:eaec5000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
Exception stack(0xeb0b1fb0 to 0xeb0b1ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070013 r4:80239bb0
r4:dffe1dc0
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:460:4620 blocked for more than 464 seconds.
r4:8524e000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b5e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8529c78c r4:8529c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529c78c r4:85063780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8524e000 r8:850637ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063780 r8:80287e08 r7:eb0b1e60 r6:8505e500 r5:8524e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0b5fb0 to 0xeb0b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85061340
INFO: task kworker/1:460:4620 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 82f4c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:461:4622 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:461 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000113 r6:eb0b9d8c r5:8524b000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:462:4624 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:462 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:8524d400 r8:850638ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8320d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r4:852c8c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c5e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf5d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529db8c r4:8529d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529db8c r4:85063980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852c8c00 r8:850639ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063980 r8:80287e08 r7:eb0bde60 r6:8505e680 r5:852c8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0c5fb0 to 0xeb0c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85061880
INFO: task kworker/1:463:4626 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000013 r6:eb0d1d8c r5:852c8000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eaf37000
r5:8529d78c r4:8529d400
r10:61c88647 r9:852c8000 r8:85063b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 83a94000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:466:4631 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:466 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:852cbc00
r4:852cbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852cbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9180
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfa13000
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529df8c r4:8529dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529df8c r4:85063c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852cb000 r8:85063c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063c00 r8:80287e08 r7:eb0d9e60 r6:8505e880 r5:852cb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb0e5fb0 to 0xeb0e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85061c00
INFO: task kworker/1:467:4633 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 83f71000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85061e40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8458ec00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:470:4639 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:470 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:852cec00
r4:852cec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852cec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84e035c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb101000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529eb8c r4:8529e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529eb8c r4:85063900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852cec00 r8:8506392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063900 r8:80287e08 r7:eb0d9e60 r6:8505ea00 r5:852cec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb109fb0 to 0xeb109ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85061840
INFO: task kworker/1:470:4639 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 841a8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:471:4641 blocked for more than 464 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:471 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb11dd84 r8:00000002 r7:60000113 r6:eb11dd8c r5:852d0000
r4:852d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb11de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505c380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb113000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529ef8c r4:8529ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529ef8c r4:85063d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852d0000 r8:85063d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063d00 r8:80287e08 r7:eb0d9e60 r6:8505ea80 r5:852d0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb11dfb0 to 0xeb11dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:852d3000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb139e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8529fb8c r4:8529f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8529fb8c r4:85063e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852d3000 r8:85063e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063e00 r8:80287e08 r7:eb0d9e60 r6:8505eb80 r5:852d3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb139fb0 to 0xeb139ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852f9280
INFO: task kworker/1:473:4645 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 847e6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
INFO: task kworker/1:474:4647 blocked for more than 465 seconds.
r5:852d2400 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:852d2400 r8:85063eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 84a9c000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:dfa21000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:85063d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063d80 r8:80287e08 r7:eb141e60 r6:8505ec80 r5:852d4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb14dfb0 to 0xeb14dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852f92c0
INFO: task kworker/1:475:4649 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 84c6f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:476:4651 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:476 state:D stack:0 pid:4651 tgid:4651 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000013 r6:eb15dd8c r5:852d3c00
r4:852d3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852d3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb155000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a038c r4:852a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a038c r4:85051c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852d3c00 r8:85051c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85051c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85051c00 r8:80287e08 r7:eb14de60 r6:8505ed00 r5:852d3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb15dfb0 to 0xeb15dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852f9440
INFO: task kworker/1:476:4651 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 84df1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:477:4653 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:477 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb07dd84 r8:00000002 r7:60000113 r6:eb07dd8c r5:85252400
r4:85252400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85252400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb07de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f96c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85252400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb167000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a078c r4:852a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a078c r4:85051f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d20: 851b8000 dfeb5000 00000001 80239b98 7f081000 00000001
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
task:kworker/1:478 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9840
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb171fb0 to 0xeb171ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070013 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852e8000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0119000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a1b8c r4:852a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a1b8c r4:85307100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85256c00 r8:8530712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307100 r8:80287e08 r7:eb14de60 r6:85307180 r5:85256c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeada5fb0 to 0xeada5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852f9a80
INFO: task kworker/1:479:4659 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 85618000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:84d87ac0
task:kworker/1:480 state:D stack:0 pid:4660 tgid:4660 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 85bcc000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:481:4661 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:481 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb17dd84 r8:00000002 r7:60000113 r6:eb17dd8c r5:85254800
r4:85254800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85254800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85254800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff97000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:852a178c r4:85307300
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:852a238c r4:852a2000
r4:85307400
Exception stack(0xeb179fb0 to 0xeb179ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:483:4666 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:483 state:D stack:0 pid:4666 tgid:4666 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb185d84 r8:00000002 r7:60000013 r6:eb185d8c r5:85259800
r4:85259800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85259800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f9f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85259800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e48ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a1f8c r4:852a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a1f8c r4:85307600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85259800 r8:8530762c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307600 r8:80287e08 r7:eb179e60 r6:85307580 r5:85259800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb185fb0 to 0xeb185ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852e8180
INFO: task kworker/1:483:4666 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 863c1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb189d84 r8:00000002 r7:60000113 r6:eb189d8c r5:8525a400
r4:8525a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8525a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8525a400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8971000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84668f8c r4:84668c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84668f8c r4:85307480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8525a400 r8:853074ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307480 r8:80287e08 r7:eb179e60 r6:85307680 r5:8525a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb189fb0 to 0xeb189ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845741c0
INFO: task kworker/1:484:4667 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:485:4670 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:485 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:85258c00
r4:85258c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85258c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eaa03000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:85307700
Exception stack(0xeb181fb0 to 0xeb181ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.15.0-rc6-syzkaller #0
r4:8525bc00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08
r5:00001000 r4:eaabb000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:487:4674 blocked for more than 465 seconds.
r4:8525c800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac3f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84668b8c r4:84668800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84668b8c r4:85307980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8525c800 r8:853079ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307980 r8:80287e08 r7:eb18de60 r6:85307a80 r5:8525c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb195fb0 to 0xeb195ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e200
INFO: task kworker/1:487:4674 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 86a1a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:488:4676 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:488 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:8525e000
r4:8525e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8525e000 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:8525e000 r8:8530782c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:489:4677 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:489 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb19dd84 r8:00000002 r7:60000013 r6:eb19dd8c r5:8525ec00
r4:8525ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8525ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530e700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8525ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabe7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a338c r4:852a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a338c r4:85307a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8525ec00 r8:85307a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307a00 r8:80287e08 r7:eb195e60 r6:8505ee00 r5:8525ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb19dfb0 to 0xeb19dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e580
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070013 r4:80239bb0
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:490 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530eb40
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:852d6000 r8:85307b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307b00 r8:80287e08 r7:eb195e60 r6:8505ee80 r5:852d6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a5fb0 to 0xeb1a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530eac0
INFO: task kworker/1:490:4680 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 872ef000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8291a684 r9:eb1add84 r8:00000002 r7:60000013 r6:eb1add8c r5:852d0c00
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a378c r4:852a3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a378c r4:85307c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852d0c00 r8:85307c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307c00 r8:80287e08 r7:eb1a5e60 r6:8505ed80 r5:852d0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1adfb0 to 0xeb1adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530e980
INFO: task kworker/1:491:4682 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8756b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
r4:dffe1dc0
r5:00001000 r4:dfa13000
r4:84e0be80
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r5:852cd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530ebc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:852cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:852a3f8c r4:852a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:852a3f8c r4:85307d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:852cd400 r8:85307dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307d80 r8:80287e08 r7:eb1b5e60 r6:8505ef80 r5:852cd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1bdfb0 to 0xeb1bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530eb00
INFO: task kworker/1:493:4686 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 87c8d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:495 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:85307f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307f80 r8:80287e08 r7:eb1b5e60 r6:8535d080 r5:85251800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c9fb0 to 0xeb1c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8530ee00
INFO: task kworker/1:495:4689 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 881f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:496:4692 blocked for more than 465 seconds.
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85390f8c r4:85390c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85390f8c r4:85063b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853c8000 r8:85063bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063b80 r8:80287e08 r7:eb1b5e60 r6:8535d180 r5:853c8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1d9fb0 to 0xeb1d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8535e240
INFO: task kworker/1:497:4693 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 882c4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:498:4696 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:498 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1e5d84 r8:00000002 r7:60000013 r6:eb1e5d8c r5:853c8c00
r4:853c8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e380
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:499:4698 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:499 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1edd84 r8:00000002 r7:60000013 r6:eb1edd8c r5:853cb000
r4:853cb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853cb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e6c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85391f8c r4:85391c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85391f8c r4:85362080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853cb000 r8:853620ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362080 r8:80287e08 r7:eb1e5e60 r6:8535d580 r5:853cb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1edfb0 to 0xeb1edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:500:4699 blocked for more than 465 seconds.
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535e580
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:501 state:D stack:0 pid:4701 tgid:4701 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535eac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb217000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85392b8c r4:85392800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85392b8c r4:85362100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853ca400 r8:8536212c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362100 r8:80287e08 r7:eb1ede60 r6:8535d200 r5:853ca400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1f9fb0 to 0xeb1f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8535e540
INFO: task kworker/1:501:4701 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 889a3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:502 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08
r5:00001000 r4:eb1ff000
r5:8539238c r4:85392000
r4:85362280
9fa0: 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:853cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
r5:8539278c r4:85392400
r4:85362380
Exception stack(0xeb215fb0 to 0xeb215ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8535ea00
INFO: task kworker/1:503:4706 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 88e5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:504:4708 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:504 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:853cec00
r4:853cec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853cec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ec40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb21d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85392f8c r4:85392c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85392f8c r4:85362400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853cec00 r8:8536242c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8535ea80
INFO: task kworker/1:504:4708 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 88e5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:505 state:D stack:0 pid:4710 tgid:4710 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535edc0
r5:8539338c r4:85393000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb229fb0 to 0xeb229ff8)
r4:8535ec00
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 89295000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:506:4712 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:506 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb235d84 r8:00000002 r7:60000113 r6:eb235d8c r5:852d6c00
r4:852d6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:852d6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8539378c r4:85393400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:85362500
Exception stack(0xeb235fb0 to 0xeb235ff8)
r4:8535ed80
Workqueue: events bpf_prog_free_deferred
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:dffe1dc0
r4:00000000
r5:85ef9f8c r4:85ef9c00
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:8291a684 r9:eb249d84 r8:00000002 r7:60000013 r6:eb249d8c r5:84d40000
r4:84d40000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d40000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85304d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d40000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb23b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85393b8c r4:85393800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85393b8c r4:85362580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d40000 r8:853625ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362580 r8:80287e08 r7:eb235e60 r6:8535d680 r5:84d40000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb249fb0 to 0xeb249ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8535ee40
INFO: task kworker/1:507:4714 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 89561000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:508:4716 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:508 state:D stack:0 pid:4716 tgid:4716 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:84d40c00
r4:84d40c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d40c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535ea40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d40c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb241000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85393f8c r4:85393c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85393f8c r4:85362600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d40c00 r8:8536262c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362600 r8:80287e08 r7:eb249e60 r6:8535d700 r5:84d40c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb251fb0 to 0xeb251ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852f9f80
INFO: task kworker/1:508:4716 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 89956000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:509:4719 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:509 state:D stack:0 pid:4719 tgid:4719 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:84d41800
r4:84d41800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d41800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e100
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d41800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb259000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539438c r4:85394000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539438c r4:85362180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d41800 r8:853621ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362180 r8:80287e08 r7:eb251e60 r6:8535d780 r5:84d41800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb199fb0 to 0xeb199ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8535e740
INFO: task kworker/1:509:4719 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 89956000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:510:4721 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:510 state:D stack:0 pid:4721 tgid:4721 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb265d84 r8:00000002 r7:60000113 r6:eb265d8c r5:84d43000
r4:84d43000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d43000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d43000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb267000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539478c r4:85394400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539478c r4:85362680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d43000 r8:853626ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362680 r8:80287e08 r7:eb199e60 r6:8535d900 r5:84d43000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb265fb0 to 0xeb265ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e0c0
INFO: task kworker/1:510:4721 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 89956000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:511:4723 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:511 state:D stack:0 pid:4723 tgid:4723 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:84d44800
r4:84d44800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d44800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d44800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb289000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539538c r4:85395000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539538c r4:85362780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d44800 r8:853627ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362780 r8:80287e08 r7:eb265e60 r6:8535d800 r5:84d44800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb275fb0 to 0xeb275ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e180
INFO: task kworker/1:511:4723 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:512:4724 blocked for more than 465 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:512 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:84d42400
r4:84d42400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d42400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e3c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d42400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb26d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85394b8c r4:85394800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85394b8c r4:85362700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d42400 r8:8536272c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362700 r8:80287e08 r7:eb275e60 r6:8535d880 r5:84d42400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb27dfb0 to 0xeb27dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e4c0
INFO: task kworker/1:512:4724 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:513:4727 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:513 state:D stack:0 pid:4727 tgid:4727 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:84d46000
r4:84d46000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d46000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d46000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb283000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85394f8c r4:85394c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85394f8c r4:85362800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d46000 r8:8536282c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362800 r8:80287e08 r7:eb275e60 r6:8535d980 r5:84d46000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb291fb0 to 0xeb291ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e380
INFO: task kworker/1:513:4727 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:514:4728 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:514 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb295d84 r8:00000002 r7:60000013 r6:eb295d8c r5:84d45400
r4:84d45400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d45400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d45400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539578c r4:85395400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539578c r4:85362880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d45400 r8:853628ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362880 r8:80287e08 r7:eb275e60 r6:8535da00 r5:84d45400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb295fb0 to 0xeb295ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e440
INFO: task kworker/1:514:4728 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a093000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:515:4730 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:515 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:84d43c00
r4:84d43c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d43c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ec40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d43c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2bd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539638c r4:85396000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539638c r4:85362900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d43c00 r8:8536292c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362900 r8:80287e08 r7:eb295e60 r6:8535da80 r5:84d43c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2a1fb0 to 0xeb2a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e640
INFO: task kworker/1:515:4730 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a90a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:516:4732 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:516 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:847e8000
r4:847e8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847e8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536e8c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85395b8c r4:85395800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85395b8c r4:85362a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847e8000 r8:85362a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362a00 r8:80287e08 r7:eb2a1e60 r6:85362980 r5:847e8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb20dfb0 to 0xeb20dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e740
INFO: task kworker/1:516:4732 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a90a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:517:4735 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:517 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:847e8c00
r4:847e8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847e8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ea00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2b7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85395f8c r4:85395c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85395f8c r4:85362a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847e8c00 r8:85362aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362a80 r8:80287e08 r7:eb2a1e60 r6:85362b80 r5:847e8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2adfb0 to 0xeb2adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e940
INFO: task kworker/1:517:4735 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8a90a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:518:4736 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:518 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:847ea400
r4:847ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847ea400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ed00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539678c r4:85396400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539678c r4:85362300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847ea400 r8:8536232c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362300 r8:80287e08 r7:eb2a1e60 r6:85362b00 r5:847ea400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1a1fb0 to 0xeb1a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536e940
INFO: task kworker/1:518:4736 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8acce000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:519:4739 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:519 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2c1d84 r8:00000002 r7:60000113 r6:eb2c1d8c r5:847eb000
r4:847eb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847eb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536ee80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2d7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85396b8c r4:85396800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85396b8c r4:85362c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847eb000 r8:85362c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362c00 r8:80287e08 r7:eb1a1e60 r6:85362d00 r5:847eb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2c1fb0 to 0xeb2c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536ed40
INFO: task kworker/1:519:4739 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8acce000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:520:4741 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:520 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000113 r6:eb2e9d8c r5:853d0000
r4:853d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa07000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539778c r4:85397400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539778c r4:85362d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d0000 r8:85362dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362d80 r8:80287e08 r7:eb2c1e60 r6:8535db00 r5:853d0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e9fb0 to 0xeb2e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536ee40
INFO: task kworker/1:520:4741 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8b2c4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:521:4743 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:521 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2f5d84 r8:00000002 r7:60000013 r6:eb2f5d8c r5:853d0c00
r4:853d0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536efc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85396f8c r4:85396c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85396f8c r4:85362e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d0c00 r8:85362e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362e00 r8:80287e08 r7:eb2e9e60 r6:8535db80 r5:853d0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2f5fb0 to 0xeb2f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8536a8c0
INFO: task kworker/1:521:4743 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8b2c4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:522:4744 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:522 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2fdd84 r8:00000002 r7:60000113 r6:eb2fdd8c r5:853d2400
r4:853d2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2fde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539738c r4:85397000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539738c r4:85362e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d2400 r8:85362eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362e80 r8:80287e08 r7:eb2e9e60 r6:8535dc00 r5:853d2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2fdfb0 to 0xeb2fdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853810c0
INFO: task kworker/1:522:4744 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8b5c1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:523:4747 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:523 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb039d84 r8:00000002 r7:60000113 r6:eb039d8c r5:853d3c00
r4:853d3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfce3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85397b8c r4:85397800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85397b8c r4:85063f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d3c00 r8:85063fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85063f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85063f80 r8:80287e08 r7:eb2e9e60 r6:8535dc80 r5:853d3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb039fb0 to 0xeb039ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853811c0
INFO: task kworker/1:523:4747 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8bab2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:524:4748 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:524 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:853d4800
r4:853d4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e005f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85397f8c r4:85397c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85397f8c r4:85362f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d4800 r8:85362fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362f80 r8:80287e08 r7:eb039e60 r6:8535dd00 r5:853d4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb099fb0 to 0xeb099ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853811c0
INFO: task kworker/1:524:4748 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8bf43000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:525:4751 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:525 state:D stack:0 pid:4751 tgid:4751 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb10dd84 r8:00000002 r7:60000113 r6:eb10dd8c r5:853d3000
r4:853d3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb10de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853815c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0513000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539838c r4:85398000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539838c r4:85362f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d3000 r8:85362f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85362f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85362f00 r8:80287e08 r7:eb099e60 r6:8535dd80 r5:853d3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb10dfb0 to 0xeb10dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85381280
INFO: task kworker/1:525:4751 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8bf43000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:526:4753 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:526 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb121d84 r8:00000002 r7:60000013 r6:eb121d8c r5:853d5400
r4:853d5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e05fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539878c r4:85398400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539878c r4:8504b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d5400 r8:8504b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504b000 r8:80287e08 r7:eb10de60 r6:8535de00 r5:853d5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb121fb0 to 0xeb121ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85381500
INFO: task kworker/1:526:4753 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8bf43000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:527:4755 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:527 state:D stack:0 pid:4755 tgid:4755 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:853d6c00
r4:853d6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb145e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853818c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0715000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85398b8c r4:85398800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85398b8c r4:8504b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d6c00 r8:8504b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504b080 r8:80287e08 r7:eb121e60 r6:8535de80 r5:853d6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb145fb0 to 0xeb145ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853813c0
INFO: task kworker/1:527:4755 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:528:4757 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:85398f8c r4:85398c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:853d6000 r8:8504b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:82ac21e4
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:529 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab1f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539978c r4:85399400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539978c r4:8504b280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d1800 r8:8504b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504b280 r8:80287e08 r7:eb301e60 r6:8535df80 r5:853d1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb309fb0 to 0xeb309ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85381940
INFO: task kworker/1:529:4759 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8c85e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
r5:85ef9f8c r4:85ef9c00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:847ec800
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08
r4:00000000
r5:8539938c r4:85399000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:847ec800 r8:8504b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r5:847ee000 r4:8291a680
r4:00000000
r4:00000000
r5:85399b8c r4:85399800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8504b100 r8:80287e08 r7:eb309e60 r6:8504b180 r5:847ee000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8cb15000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:532:4766 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:532 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb315d84 r8:00000002 r7:60000113 r6:eb315d8c r5:847eec00
r4:847eec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847eec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85381ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacf1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85399f8c r4:85399c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85399f8c r4:8504b400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847eec00 r8:8504b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8536af00
r5:8539a38c r4:8539a000
r10:61c88647 r9:847ed400 r8:8504b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:534:4768 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:534 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb31dd84 r8:00000002 r7:60000113 r6:eb31dd8c r5:847ebc00
r4:847ebc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:847ebc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:847ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae25000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539a78c r4:8539a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539a78c r4:8504b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:847ebc00 r8:8504b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504b600 r8:80287e08 r7:eb2d1e60 r6:8504b680 r5:847ebc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb31dfb0 to 0xeb31dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85381d40
INFO: task kworker/1:534:4768 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8d1f7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:dffe1dc0
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:535:4772 blocked for more than 466 seconds.
r5:847e9800 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb319fb0 to 0xeb319ff8)
r4:85031240
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:536:4773 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:536 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb325d84 r8:00000002 r7:60000013 r6:eb325d8c r5:8525b000
r4:8525b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8525b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb325e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8525b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae67000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539b38c r4:8539b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539b38c r4:8504b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8525b000 r8:8504b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504b800 r8:80287e08 r7:eb319e60 r6:8504b880 r5:8525b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb325fb0 to 0xeb325ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031240
INFO: task kworker/1:536:4773 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8d7aa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:537:4774 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:537 state:D stack:0 pid:4774 tgid:4774 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:84d28000
r4:84d28000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d28000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d28000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae4f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539af8c r4:8539ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539af8c r4:8504b900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d28000 r8:8504b92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504b900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504b900 r8:80287e08 r7:eb325e60 r6:8504ba80 r5:84d28000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb321fb0 to 0xeb321ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031300
INFO: task kworker/1:537:4774 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8d7aa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:853d9800 r4:8291a680
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r9:83018205 r8:853d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
r5:8539bb8c r4:8539b800
r7:ddde2d80 r6:83018200 r5:8539bb8c r4:8504b980
r10:00000000 r9:8504b980 r8:80287e08 r7:eb325e60 r6:84df0000 r5:853d9800
r4:85031500
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:539:4780 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:539 state:D stack:0 pid:4780 tgid:4780 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:853db000
r4:853db000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853db000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853db000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae87000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539b78c r4:8539b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539b78c r4:8504bb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853db000 r8:8504bbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504bb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504bb80 r8:80287e08 r7:eb32de60 r6:84df0080 r5:853db000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb339fb0 to 0xeb339ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850315c0
INFO: task kworker/1:539:4780 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8db4a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:540:4781 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:540 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:853dbc00
r4:853dbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853dbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850318c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8539bf8c r4:8539bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8539bf8c r4:8504bb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853dbc00 r8:8504bb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504bb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504bb00 r8:80287e08 r7:eb32de60 r6:84df0100 r5:853dbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb33dfb0 to 0xeb33dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850315c0
INFO: task kworker/1:540:4781 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:dffe1dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:85ef9f8c r4:85ef9c00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/1:541 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:853d8c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb02f000
r5:853a1f8c r4:853a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:853d8c00 r8:8504bc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031800
INFO: task kworker/1:541:4783 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8e15a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:542:4785 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:542 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb349d84 r8:00000002 r7:60000013 r6:eb349d8c r5:853dd400
r4:853dd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853dd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaecd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a038c r4:853a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a038c r4:8504bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853dd400 r8:8504bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504bd00 r8:80287e08 r7:eb341e60 r6:84df0200 r5:853dd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb349fb0 to 0xeb349ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031980
INFO: task kworker/1:542:4785 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:543:4788 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:543 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb355d84 r8:00000002 r7:60000113 r6:eb355d8c r5:853da400
r4:853da400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853da400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853da400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a078c r4:853a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a078c r4:8504bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853da400 r8:8504bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504bd80 r8:80287e08 r7:eb341e60 r6:84df0280 r5:853da400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb355fb0 to 0xeb355ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031a40
INFO: task kworker/1:543:4788 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8e407000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
r5:853dc800 r4:8291a680
r4:00000000
r4:00000000
r5:853a0b8c r4:853a0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fa0: 00000000 00000000 00000000 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:82ac21e4
r4:dffe1dc0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:545:4790 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:545 state:D stack:0 pid:4790 tgid:4790 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb335d84 r8:00000002 r7:60000013 r6:eb335d8c r5:84d2a400
r4:84d2a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d2a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85031e40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf2f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a0f8c r4:853a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a0f8c r4:8504bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d2a400 r8:8504bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504bc80 r8:80287e08 r7:eb341e60 r6:8504bf00 r5:84d2a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb335fb0 to 0xeb335ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031c40
INFO: task kworker/1:545:4790 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8e8ef000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84d2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
r5:853a138c r4:853a1000
r7:ddde2d80 r6:83018200 r5:853a138c r4:85362c80
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
1d20: 8ebf5000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:547:4795 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:547 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb361d84 r8:00000002 r7:60000013 r6:eb361d8c r5:84d2bc00
r4:84d2bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d2bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb361e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb009000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a178c r4:853a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a178c r4:8504bf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d2bc00 r8:8504bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8504bf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8504bf80 r8:80287e08 r7:eb341e60 r6:8504be80 r5:84d2bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb361fb0 to 0xeb361ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85031640
INFO: task kworker/1:547:4795 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r9:83018205 r8:84d2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
r5:853a1b8c r4:853a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a1b8c r4:847e4080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d2c800 r8:847e40ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847e4080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847e4080 r8:80287e08 r7:eb341e60 r6:847e4180 r5:84d2c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb369fb0 to 0xeb369ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e1280
INFO: task kworker/1:548:4798 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8ebf5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
r5:85ef9f8c r4:85ef9c00
r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:549:4799 blocked for more than 466 seconds.
r4:84d2d400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a2b8c r4:853a2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a2b8c r4:847e4000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d2d400 r8:847e402c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847e4000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847e4000 r8:80287e08 r7:eb341e60 r6:847e4100 r5:84d2d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb331fb0 to 0xeb331ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e1280
INFO: task kworker/1:549:4799 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8ef44000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
r4:84d2e000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:eb03d000
r5:853a238c r4:853a2000
r10:61c88647 r9:84d2e000 r8:847e422c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8f385000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:551:4804 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:551 state:D stack:0 pid:4804 tgid:4804 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:84d2ec00 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e13c0
r5:853a278c r4:853a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d2ec00 r8:847e42ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb375fb0 to 0xeb375ff8)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e1380
INFO: task kworker/1:551:4804 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8f76b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:552:4805 blocked for more than 466 seconds.
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:853a2f8c r4:853a2c00
r4:847e4300
Exception stack(0xeb36dfb0 to 0xeb36dff8)
INFO: task kworker/1:552:4805 is blocked on a mutex likely owned by task kworker/0:123:3540.
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:553:4808 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:553 state:D stack:0 pid:4808 tgid:4808 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb379d84 r8:00000002 r7:60000113 r6:eb379d8c r5:84d28c00
r4:84d28c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d28c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e1800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb089000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a338c r4:853a3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:554:4810 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:554 state:D stack:0 pid:4810 tgid:4810 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:8525d400 r8:847e46ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8fdb6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:555:4811 blocked for more than 466 seconds.
r4:853f8000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:853a378c r4:853a3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a378c r4:847e4580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853f8000 r8:847e45ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847e4580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847e4580 r8:80287e08 r7:eb381e60 r6:847e4880 r5:853f8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb385fb0 to 0xeb385ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e1940
INFO: task kworker/1:555:4811 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 8fdb6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:556:4814 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:556 state:D stack:0 pid:4814 tgid:4814 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb389d84 r8:00000002 r7:60000013 r6:eb389d8c r5:853f8c00
r4:853f8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853f8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853a3f8c r4:853a3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853a3f8c r4:847e4700
r10:61c88647 r9:853f8c00 r8:847e472c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:847e4700 r8:80287e08 r7:eb381e60 r6:847e4980 r5:853f8c00
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:85ef9f8c r4:85ef9c00
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
task:kworker/1:557 state:D stack:0 pid:4815 tgid:4815 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:853f9800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:853f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
r5:853ac38c r4:853ac000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ac38c r4:847e4a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853f9800 r8:847e4a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847e4a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847e4a00 r8:80287e08 r7:eb389e60 r6:847e4800 r5:853f9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb37dfb0 to 0xeb37dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e1ac0
INFO: task kworker/1:557:4815 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 90423000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:558:4817 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:558 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
r4:853fa400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:558:4817 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 90467000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:559:4819 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:559 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb399d84 r8:00000002 r7:60000013 r6:eb399d8c r5:853fb000
r4:853fb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853fb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5a240
r9:83018205 r8:853fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
r5:853acb8c r4:853ac800
r7:ddde2d80 r6:83018200 r5:853acb8c r4:847e4a80
r10:00000000 r9:847e4a80 r8:80287e08 r7:eb395e60 r6:847e4b00 r5:853fb000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
1d20: 906b9000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:560 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xeb3a5fb0 to 0xeb3a5ff8)
INFO: task kworker/1:560:4821 is blocked on a mutex likely owned by task kworker/0:123:3540.
1d20: 90b55000 dfeb5000 00000001 80239b98 7f081000 00000001
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:561:4823 blocked for more than 466 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:561 state:D stack:0 pid:4823 tgid:4823 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000113 r6:eb3a9d8c r5:853fc800
r4:853fc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853fc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5a6c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb125000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ad78c r4:853ad400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ad78c r4:847e4c80
r10:61c88647 r9:853fc800 r8:847e4cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
1d20: 90e1b000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:562:4824 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:562 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:853fd400
r4:853fd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853fd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5a640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb115000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853ad38c r4:853ad000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853ad38c r4:847e4d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853fd400 r8:847e4d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847e4d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847e4d00 r8:80287e08 r7:eb3a9e60 r6:847e4e00 r5:853fd400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3b1fb0 to 0xeb3b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d5a3c0
INFO: task kworker/1:562:4824 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:853de000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08
r9:83018205 r8:853de000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb131000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853adb8c r4:853ad800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853adb8c r4:847e4f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853de000 r8:847e4fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:847e4f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:847e4f80 r8:80287e08 r7:eb3a9e60 r6:84df0380 r5:853de000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3bdfb0 to 0xeb3bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d5a8c0
INFO: task kworker/1:563:4827 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 91492000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000113 r6:eb3c5d8c r5:84d46c00
r4:84d46c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d46c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d46c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb38b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853af78c r4:853af400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853af78c r4:8536d000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d46c00 r8:8536d02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536d000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536d000 r8:80287e08 r7:eb3bde60 r6:84df0400 r5:84d46c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb3c5fb0 to 0xeb3c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d5a800
INFO: task kworker/1:564:4829 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xdffe1d28 to 0xdffe1d70)
r5:80070013 r4:80239bb0
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:565 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9167d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:84c70c00 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:853ae38c r4:853ae000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:8536d080 r8:80287e08 r7:eb3c5e60 r6:84df0500 r5:84c70c00
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r5:80070013 r4:80239bb0
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/1:567 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
Exception stack(0xeb3d9fb0 to 0xeb3d9ff8)
INFO: task kworker/1:567:4834 is blocked on a mutex likely owned by task kworker/0:123:3540.
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:568:4836 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:568 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:84c71800
r4:84c71800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c71800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d5ad40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c71800 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb169000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853aeb8c r4:853ae800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853aeb8c r4:8536d300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c71800 r8:8536d32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536d300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536d300 r8:80287e08 r7:eb3c5e60 r6:84df0600 r5:84c71800
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:84d87ac0
task:kworker/1:569 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08
r9:83018205 r8:84c70000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000
r5:853aef8c r4:853aec00
r10:61c88647 r9:84c70000 r8:8536d3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:570:4840 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:570 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb421d84 r8:00000002 r7:60000113 r6:eb421d8c r5:84c73000
r4:84c73000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c73000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062180
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c73000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853afb8c r4:853af800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853afb8c r4:8536d100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c73000 r8:8536d12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536d100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536d100 r8:80287e08 r7:eb3c5e60 r6:84df0700 r5:84c73000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb421fb0 to 0xeb421ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847e1dc0
INFO: task kworker/1:570:4840 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 92428000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
r5:84c73c00 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850626c0
r5:853b0b8c r4:853b0800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
1d20: 92428000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:572:4844 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:572 state:D stack:0 pid:4844 tgid:4844 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:84c76000
r4:84c76000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c76000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850622c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84c76000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb433000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853aff8c r4:853afc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853aff8c r4:8536d580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84c76000 r8:8536d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536d580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536d580 r8:80287e08 r7:eb429e60 r6:84df0800 r5:84c76000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb439fb0 to 0xeb439ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85062140
INFO: task kworker/1:572:4844 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Call trace:
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:85ef9f8c r4:85ef9c00
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:853b038c r4:853b0000
r4:8536d600
Exception stack(0xeb445fb0 to 0xeb445ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 92b36000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:574:4848 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:574 state:D stack:0 pid:4848 tgid:4848 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb455d84 r8:00000002 r7:60000013 r6:eb455d8c r5:84c74800
r4:84c74800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84c74800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062580
r5:853b078c r4:853b0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8536d680
Exception stack(0xeb455fb0 to 0xeb455ff8)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:575:4851 blocked for more than 467 seconds.
r4:84c76c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:84c76c00 r8:8536d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 93005000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:576:4853 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:576 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb1c5d84 r8:00000002 r7:60000113 r6:eb1c5d8c r5:853d8000
r4:853d8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853d8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062a00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea99d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b138c r4:853b1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b138c r4:8536d480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853d8000 r8:8536d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536d480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536d480 r8:80287e08 r7:eb1b9e60 r6:84df0a00 r5:853d8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1c5fb0 to 0xeb1c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85062800
INFO: task kworker/1:576:4853 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:dffe1dc0
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Not tainted 6.15.0-rc6-syzkaller #0
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b5e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062a80
r5:853b178c r4:853b1400
r10:61c88647 r9:853fe000 r8:8536d82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:578:4859 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:578 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb3add84 r8:00000002 r7:60000113 r6:eb3add8c r5:853fec00
r4:853fec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853fec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaadf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b1b8c r4:853b1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b1b8c r4:8536d200
r10:61c88647 r9:853fec00 r8:8536d22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fa0: 00000000 00000000 00000000 00000000
task:kworker/1:579 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000
r9:83018205 r8:85400000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
r10:61c88647 r9:85400000 r8:8536d92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536d900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536d900 r8:80287e08 r7:eb3ade60 r6:8536da80 r5:85400000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb1cdfb0 to 0xeb1cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85062b80
INFO: task kworker/1:579:4861 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93c92000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e1f40
r5:853b278c r4:853b2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85400c00 r8:8536d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85062d80
INFO: task kworker/1:580:4864 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 93c92000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:581:4865 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:581 state:D stack:0 pid:4865 tgid:4865 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85401800
r4:85401800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85401800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85062f40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85401800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b238c r4:853b2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b238c r4:8536da00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85401800 r8:8536da2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536da00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536da00 r8:80287e08 r7:eb24de60 r6:8536db00 r5:85401800
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
1d20: 9422e000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/1:582:4867 blocked for more than 467 seconds.
r5:85402400 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb040
r5:853b2b8c r4:853b2800
r10:61c88647 r9:85402400 r8:8536dc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
1d20: 9422e000 dfeb5000 00000001 80239b98 7f081000 00000001
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Not tainted 6.15.0-rc6-syzkaller #0
r4:85403000
r5:85403000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85403000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadd5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b338c r4:853b3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b338c r4:8536dd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85403000 r8:8536ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536dd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536dd80 r8:80287e08 r7:eb25de60 r6:8536de80 r5:85403000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb281fb0 to 0xeb281ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fb2c0
INFO: task kworker/1:583:4869 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9422e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0: 00000000 00000000 00000000 00000000
r4:84d87ac0
INFO: task kworker/1:584:4872 blocked for more than 467 seconds.
Workqueue: events bpf_prog_free_deferred
r4:85403c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08
r4:00000000
r5:00001000 r4:eaf9f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b3b8c r4:853b3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b3b8c r4:8536dc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85403c00 r8:8536dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536dc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536dc80 r8:80287e08 r7:eb281e60 r6:847e4f00 r5:85403c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb29dfb0 to 0xeb29dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fb340
INFO: task kworker/1:584:4872 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 94806000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:585:4874 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:585 state:D stack:0 pid:4874 tgid:4874 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb299d84 r8:00000002 r7:60000113 r6:eb299d8c r5:85404800
r4:85404800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85404800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb299e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85404800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf95000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b378c r4:853b3400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b378c r4:85307f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85404800 r8:85307f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85307f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85307f00 r8:80287e08 r7:eb29de60 r6:85307c80 r5:85404800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb299fb0 to 0xeb299ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fb4c0
INFO: task kworker/1:585:4874 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 94f95000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:586:4876 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:586 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2b1d84 r8:00000002 r7:60000013 r6:eb2b1d8c r5:85405400
r4:85405400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85405400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85405400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853b3f8c r4:853b3c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853b3f8c r4:8536df80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85405400 r8:8536dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536df80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536df80 r8:80287e08 r7:eb29de60 r6:8536de00 r5:85405400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2b1fb0 to 0xeb2b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fb580
INFO: task kworker/1:586:4876 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 94f95000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:587:4878 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:587 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000013 r6:eb2e1d8c r5:85406000
r4:85406000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85406000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fb940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85406000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb001000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bc38c r4:853bc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bc38c r4:852e3100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85406000 r8:852e312c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3100 r8:80287e08 r7:eb2b1e60 r6:852e3180 r5:85406000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb2e1fb0 to 0xeb2e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fb7c0
INFO: task kworker/1:587:4878 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 95046000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:588:4880 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:588 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:85406c00
r4:85406c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85406c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fbac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85406c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bc78c r4:853bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bc78c r4:852e3000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85406c00 r8:852e302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3000 r8:80287e08 r7:eb2e1e60 r6:852e3280 r5:85406c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb45dfb0 to 0xeb45dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fb880
INFO: task kworker/1:588:4880 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9569f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:589:4883 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:589 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb461d84 r8:00000002 r7:60000013 r6:eb461d8c r5:85408000
r4:85408000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85408000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fbc40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85408000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bcb8c r4:853bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bcb8c r4:852e3080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85408000 r8:852e30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3080 r8:80287e08 r7:eb45de60 r6:852e3380 r5:85408000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb461fb0 to 0xeb461ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fba80
INFO: task kworker/1:589:4883 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9569f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:590:4885 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:590 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb465d84 r8:00000002 r7:60000013 r6:eb465d8c r5:85409800
r4:85409800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85409800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fbdc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85409800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bcf8c r4:853bcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bcf8c r4:852e3200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85409800 r8:852e322c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3200 r8:80287e08 r7:eb461e60 r6:852e3480 r5:85409800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb465fb0 to 0xeb465ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fbc00
INFO: task kworker/1:590:4885 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 95cb9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:591:4886 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:591 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:8540a400
r4:8540a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8540a400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb203000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533838c r4:85338000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8533838c r4:852e3300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540a400 r8:852e332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3300 r8:80287e08 r7:eb465e60 r6:852e3400 r5:8540a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb46dfb0 to 0xeb46dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fbc00
INFO: task kworker/1:591:4886 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 95cb9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:289:4889 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:289 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb475d84 r8:00000002 r7:60000013 r6:eb475d8c r5:8540bc00
r4:8540bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f66c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8540bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb23f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533938c r4:85339000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533938c r4:84df0b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540bc00 r8:84df0bac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84df0b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df0b80 r8:80287e08 r7:eaf55e60 r6:852e3500 r5:8540bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb475fb0 to 0xeb475ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f6240
INFO: task kworker/0:289:4889 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 95ebc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:290:4890 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:290 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:8540c800
r4:8540c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8540c800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb219000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533878c r4:85338400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533878c r4:84df0c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540c800 r8:84df0c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84df0c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df0c00 r8:80287e08 r7:eb475e60 r6:852e3580 r5:8540c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb47dfb0 to 0xeb47dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f6240
INFO: task kworker/0:290:4890 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 962f1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:592:4891 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:592 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb481d84 r8:00000002 r7:60000013 r6:eb481d8c r5:8540d400
r4:8540d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb26b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bd38c r4:853bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bd38c r4:852e3600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540d400 r8:852e362c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3600 r8:80287e08 r7:eb46de60 r6:852e3680 r5:8540d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb481fb0 to 0xeb481ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850571c0
INFO: task kworker/1:592:4891 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 96685000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:291:4893 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:291 state:D stack:0 pid:4893 tgid:4893 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb489d84 r8:00000002 r7:60000113 r6:eb489d8c r5:8540e000
r4:8540e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8540e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb225000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85338b8c r4:85338800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85338b8c r4:84df0a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540e000 r8:84df0aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84df0a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df0a80 r8:80287e08 r7:eb475e60 r6:84df0d00 r5:8540e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb489fb0 to 0xeb489ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f62c0
INFO: task kworker/0:291:4893 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 96685000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:292:4895 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:292 state:D stack:0 pid:4895 tgid:4895 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:853e9800
r4:853e9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853e9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:853e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb237000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85338f8c r4:85338c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85338f8c r4:84df0b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853e9800 r8:84df0b2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84df0b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df0b00 r8:80287e08 r7:eb475e60 r6:84df0e00 r5:853e9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb469fb0 to 0xeb469ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f6440
INFO: task kworker/0:292:4895 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 96890000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:593:4896 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:593 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb471d84 r8:00000002 r7:60000013 r6:eb471d8c r5:853e8000
r4:853e8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853e8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa1b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853be78c r4:853be400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853be78c r4:852e3700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853e8000 r8:852e372c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3700 r8:80287e08 r7:eb481e60 r6:84df0c80 r5:853e8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb471fb0 to 0xeb471ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:850573c0
INFO: task kworker/1:593:4896 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 96f3d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:293:4900 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:293 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:853ea400
r4:853ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853ea400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb25f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533978c r4:85339400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533978c r4:84df0d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853ea400 r8:84df0dac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84df0d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df0d80 r8:80287e08 r7:eb475e60 r6:84df0e80 r5:853ea400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb48dfb0 to 0xeb48dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f6700
INFO: task kworker/0:293:4900 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 97401000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:294:4902 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:294 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:853eb000
r4:853eb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853eb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d52700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:853eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb653000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533a78c r4:8533a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533a78c r4:84df0f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853eb000 r8:84df0f2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84df0f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84df0f00 r8:80287e08 r7:eb48de60 r6:84df0f80 r5:853eb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb495fb0 to 0xeb495ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f67c0
INFO: task kworker/0:294:4902 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 975b0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:295:4904 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:295 state:D stack:0 pid:4904 tgid:4904 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:853ebc00
r4:853ebc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853ebc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d52840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:853ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb645000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533a38c r4:8533a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533a38c r4:852ed000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853ebc00 r8:852ed02c r7:82804d40 r6:dddced80 r5:dddceda0
r4:852ed000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ed000 r8:80287e08 r7:eb495e60 r6:852ed080 r5:853ebc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb491fb0 to 0xeb491ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f67c0
INFO: task kworker/0:295:4904 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 97d18000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:594:4906 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:594 state:D stack:0 pid:4906 tgid:4906 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:853ec800
r4:853ec800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853ec800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb277000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bd78c r4:853bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bd78c r4:852e3780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853ec800 r8:852e37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3780 r8:80287e08 r7:eb471e60 r6:852ed100 r5:853ec800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb49dfb0 to 0xeb49dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057940
INFO: task kworker/1:594:4906 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 98279000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:595:4910 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:595 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4add84 r8:00000002 r7:60000013 r6:eb4add8c r5:853e8c00
r4:853e8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853e8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057ac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb287000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bdb8c r4:853bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bdb8c r4:852e3880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853e8c00 r8:852e38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3880 r8:80287e08 r7:eb471e60 r6:852ed180 r5:853e8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4adfb0 to 0xeb4adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057a00
INFO: task kworker/1:595:4910 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 98898000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:596:4911 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:596 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb345d84 r8:00000002 r7:60000113 r6:eb345d8c r5:853ed400
r4:853ed400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853ed400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057b40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bdf8c r4:853bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bdf8c r4:852e3900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853ed400 r8:852e392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3900 r8:80287e08 r7:eb471e60 r6:852ed200 r5:853ed400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb345fb0 to 0xeb345ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057a00
INFO: task kworker/1:596:4911 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 98898000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:597:4912 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:597 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:853ee000
r4:853ee000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853ee000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853be38c r4:853be000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853be38c r4:852e3800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853ee000 r8:852e382c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3800 r8:80287e08 r7:eb471e60 r6:852ed280 r5:853ee000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb34dfb0 to 0xeb34dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057c40
INFO: task kworker/1:597:4912 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 98d7b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:598:4913 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:598 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb41dd84 r8:00000002 r7:60000113 r6:eb41dd8c r5:846a0000
r4:846a0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e063b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bf38c r4:853bf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bf38c r4:852e3980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a0000 r8:852e39ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3980 r8:80287e08 r7:eb471e60 r6:852ed300 r5:846a0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb41dfb0 to 0xeb41dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057c40
INFO: task kworker/1:598:4913 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 98d7b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:599:4916 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:599 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb42dd84 r8:00000002 r7:60000013 r6:eb42dd8c r5:846a0c00
r4:846a0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057700
r4:00000000
r5:00001000 r4:dfea1000
r5:853beb8c r4:853be800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853beb8c r4:852e3a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a0c00 r8:852e3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3a00 r8:80287e08 r7:eb41de60 r6:852ed380 r5:846a0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb42dfb0 to 0xeb42dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057fc0
INFO: task kworker/1:599:4916 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 98f79000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:600:4917 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:600 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000113 r6:eb4b1d8c r5:846a1800
r4:846a1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850571c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e04cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bef8c r4:853bec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bef8c r4:852e3b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a1800 r8:852e3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3b00 r8:80287e08 r7:eb41de60 r6:852ed400 r5:846a1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b1fb0 to 0xeb4b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85057e80
INFO: task kworker/1:600:4917 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 992a0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:601:4920 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:601 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:8540ec00
r4:8540ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8540ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e8961000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bfb8c r4:853bf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bfb8c r4:852e3c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540ec00 r8:852e3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3c00 r8:80287e08 r7:eb41de60 r6:852e3a80 r5:8540ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a9fb0 to 0xeb4a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec240
INFO: task kworker/1:601:4920 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 996be000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:602:4922 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:602 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4a1d84 r8:00000002 r7:60000113 r6:eb4a1d8c r5:8540b000
r4:8540b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8540b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8540b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0811000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bf78c r4:853bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bf78c r4:852e3c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8540b000 r8:852e3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3c80 r8:80287e08 r7:eb4a9e60 r6:852e3b80 r5:8540b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4a1fb0 to 0xeb4a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec240
INFO: task kworker/1:602:4922 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 99a1c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:603:4925 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:603 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4c5d84 r8:00000002 r7:60000113 r6:eb4c5d8c r5:846a3000
r4:846a3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853bff8c r4:853bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853bff8c r4:852e3e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a3000 r8:852e3e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3e00 r8:80287e08 r7:eb4a9e60 r6:852ed480 r5:846a3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4c5fb0 to 0xeb4c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec300
INFO: task kworker/1:603:4925 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 99a1c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:604:4927 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:604 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4cdd84 r8:00000002 r7:60000113 r6:eb4cdd8c r5:846a2400
r4:846a2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec5c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead03000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c438c r4:853c4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c438c r4:852e3d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a2400 r8:852e3d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3d00 r8:80287e08 r7:eb4c5e60 r6:852ed500 r5:846a2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4cdfb0 to 0xeb4cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec3c0
INFO: task kworker/1:604:4927 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 99bd9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:605:4928 blocked for more than 467 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:605 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:846a3c00
r4:846a3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ecb00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae93000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c538c r4:853c5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c538c r4:852e3f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a3c00 r8:852e3f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3f00 r8:80287e08 r7:eb4cde60 r6:852ed580 r5:846a3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d1fb0 to 0xeb4d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec3c0
INFO: task kworker/1:605:4928 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 99bd9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:606:4929 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:606 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000013 r6:eb4d5d8c r5:846a5400
r4:846a5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae23000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c478c r4:853c4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c478c r4:8536df00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a5400 r8:8536df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8536df00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8536df00 r8:80287e08 r7:eb4d1e60 r6:852ed600 r5:846a5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d5fb0 to 0xeb4d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec3c0
INFO: task kworker/1:606:4929 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9a57f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:607:4932 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:607 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4e1d84 r8:00000002 r7:60000113 r6:eb4e1d8c r5:846a6000
r4:846a6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae3d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c4b8c r4:853c4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c4b8c r4:84dfc000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a6000 r8:84dfc02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc000 r8:80287e08 r7:eb4d1e60 r6:852ed680 r5:846a6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e1fb0 to 0xeb4e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec7c0
INFO: task kworker/1:607:4932 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9a57f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:608:4934 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:608 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:85430000
r4:85430000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85430000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ec9c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85430000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae5b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c4f8c r4:853c4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c4f8c r4:84dfc080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85430000 r8:84dfc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc080 r8:80287e08 r7:eb4d1e60 r6:852ed700 r5:85430000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4e9fb0 to 0xeb4e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec900
INFO: task kworker/1:608:4934 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9a7d6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:609:4935 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:609 state:D stack:0 pid:4935 tgid:4935 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000013 r6:eb4edd8c r5:85430c00
r4:85430c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85430c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ecdc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85430c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaecf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c5b8c r4:853c5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c5b8c r4:84dfc200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85430c00 r8:84dfc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc200 r8:80287e08 r7:eb4d1e60 r6:852ed780 r5:85430c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4edfb0 to 0xeb4edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ec900
INFO: task kworker/1:609:4935 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9a7d6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:610:4938 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:610 state:D stack:0 pid:4938 tgid:4938 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4f9d84 r8:00000002 r7:60000013 r6:eb4f9d8c r5:85433000
r4:85433000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85433000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ecc40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85433000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaeaf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c578c r4:853c5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c578c r4:84dfc280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85433000 r8:84dfc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc280 r8:80287e08 r7:eb4ede60 r6:852ed800 r5:85433000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4f9fb0 to 0xeb4f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852eca40
INFO: task kworker/1:610:4938 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9ab5e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:611:4941 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:611 state:D stack:0 pid:4941 tgid:4941 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb501d84 r8:00000002 r7:60000013 r6:eb501d8c r5:85432400
r4:85432400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85432400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ece40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85432400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaef9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c5f8c r4:853c5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c5f8c r4:84dfc300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85432400 r8:84dfc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc300 r8:80287e08 r7:eb4ede60 r6:852ed880 r5:85432400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb501fb0 to 0xeb501ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ecd80
INFO: task kworker/1:611:4941 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9ab5e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:612:4942 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:612 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb505d84 r8:00000002 r7:60000013 r6:eb505d8c r5:85431800
r4:85431800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85431800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85431800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb007000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c678c r4:853c6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c678c r4:84dfc180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85431800 r8:84dfc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc180 r8:80287e08 r7:eb501e60 r6:852ed900 r5:85431800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb505fb0 to 0xeb505ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ece80
INFO: task kworker/1:612:4942 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9b5f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:613:4943 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:613 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb509d84 r8:00000002 r7:60000013 r6:eb509d8c r5:85434800
r4:85434800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85434800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85057740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85434800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf39000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c638c r4:853c6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c638c r4:84dfc380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85434800 r8:84dfc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc380 r8:80287e08 r7:eb505e60 r6:852ed980 r5:85434800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb509fb0 to 0xeb509ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852ece80
INFO: task kworker/1:613:4943 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9b5f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:614:4946 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:614 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb50dd84 r8:00000002 r7:60000113 r6:eb50dd8c r5:85435400
r4:85435400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85435400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85435400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb023000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c6b8c r4:853c6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c6b8c r4:84dfc100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85435400 r8:84dfc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc100 r8:80287e08 r7:eb505e60 r6:852eda00 r5:85435400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb50dfb0 to 0xeb50dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845744c0
INFO: task kworker/1:614:4946 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9bb20000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:615:4948 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:615 state:D stack:0 pid:4948 tgid:4948 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb515d84 r8:00000002 r7:60000013 r6:eb515d8c r5:85436c00
r4:85436c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85436c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85436c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb02d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c6f8c r4:853c6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c6f8c r4:84dfc480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85436c00 r8:84dfc4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc480 r8:80287e08 r7:eb50de60 r6:852eda80 r5:85436c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb515fb0 to 0xeb515ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd240
INFO: task kworker/1:615:4948 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9bb20000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:616:4950 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:616 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb51dd84 r8:00000002 r7:60000013 r6:eb51dd8c r5:846a4800
r4:846a4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb05b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c778c r4:853c7400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c778c r4:84dfc400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a4800 r8:84dfc42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc400 r8:80287e08 r7:eb515e60 r6:852edb00 r5:846a4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb51dfb0 to 0xeb51dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd240
INFO: task kworker/1:616:4950 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9bee5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:617:4951 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:617 state:D stack:0 pid:4951 tgid:4951 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:85408c00
r4:85408c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85408c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85408c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb047000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c738c r4:853c7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c738c r4:84dfc580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85408c00 r8:84dfc5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc580 r8:80287e08 r7:eb51de60 r6:84dfc680 r5:85408c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4f5fb0 to 0xeb4f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd100
INFO: task kworker/1:617:4951 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9c649000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:618:4954 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:618 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:853eec00
r4:853eec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:853eec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb09d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c7f8c r4:853c7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c7f8c r4:84dfc780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:853eec00 r8:84dfc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc780 r8:80287e08 r7:eb51de60 r6:84dfc600 r5:853eec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb519fb0 to 0xeb519ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd640
INFO: task kworker/1:618:4954 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9c649000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:619:4955 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:619 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000113 r6:eb4b9d8c r5:85418000
r4:85418000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85418000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85418000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb06d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:853c7b8c r4:853c7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:853c7b8c r4:84dfc500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85418000 r8:84dfc52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc500 r8:80287e08 r7:eb519e60 r6:84dfc880 r5:85418000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4b9fb0 to 0xeb4b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd640
INFO: task kworker/1:619:4955 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9cd72000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:620:4958 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:620 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb525d84 r8:00000002 r7:60000013 r6:eb525d8c r5:85418c00
r4:85418c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85418c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb525e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fd7c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85418c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548438c r4:85484000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548438c r4:84dfc700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85418c00 r8:84dfc72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc700 r8:80287e08 r7:eb519e60 r6:84dfc900 r5:85418c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb525fb0 to 0xeb525ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd940
INFO: task kworker/1:620:4958 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9cd72000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:621:4960 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:621 state:D stack:0 pid:4960 tgid:4960 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb52dd84 r8:00000002 r7:60000013 r6:eb52dd8c r5:85419800
r4:85419800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85419800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdc40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85419800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0df000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85484b8c r4:85484800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85484b8c r4:84dfc980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85419800 r8:84dfc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc980 r8:80287e08 r7:eb525e60 r6:84dfca80 r5:85419800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb52dfb0 to 0xeb52dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd800
INFO: task kworker/1:621:4960 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9cec0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:622:4962 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:622 state:D stack:0 pid:4962 tgid:4962 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:8541b000
r4:8541b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fda00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541b000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548478c r4:85484400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548478c r4:84dfc800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541b000 r8:84dfc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfc800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfc800 r8:80287e08 r7:eb52de60 r6:84dfca00 r5:8541b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb531fb0 to 0xeb531ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fd9c0
INFO: task kworker/1:622:4962 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9d258000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:623:4964 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:623 state:D stack:0 pid:4964 tgid:4964 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:8541bc00
r4:8541bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb10f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548538c r4:85485000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548538c r4:84dfcb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541bc00 r8:84dfcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfcb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfcb00 r8:80287e08 r7:eb52de60 r6:84dfcc80 r5:8541bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb529fb0 to 0xeb529ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fdc00
INFO: task kworker/1:623:4964 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9d258000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:624:4966 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:624 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:8541c800
r4:8541c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852fdd80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85484f8c r4:85484c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85484f8c r4:84dfcb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541c800 r8:84dfcbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfcb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfcb80 r8:80287e08 r7:eb529e60 r6:84dfcd00 r5:8541c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb535fb0 to 0xeb535ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:852fdcc0
INFO: task kworker/1:624:4966 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9d4c0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:625:4968 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:625 state:D stack:0 pid:4968 tgid:4968 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb539d84 r8:00000002 r7:60000013 r6:eb539d8c r5:8541d400
r4:8541d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854611c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541d400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb149000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85485f8c r4:85485c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85485f8c r4:84dfcd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541d400 r8:84dfcdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfcd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfcd80 r8:80287e08 r7:eb529e60 r6:84dfce80 r5:8541d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb539fb0 to 0xeb539ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:845744c0
INFO: task kworker/1:625:4968 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9da8a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:626:4970 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:626 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb53dd84 r8:00000002 r7:60000013 r6:eb53dd8c r5:8541e000
r4:8541e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb123000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548578c r4:85485400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548578c r4:84dfcc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541e000 r8:84dfcc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfcc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfcc00 r8:80287e08 r7:eb539e60 r6:84dfcf80 r5:8541e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb53dfb0 to 0xeb53dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461080
INFO: task kworker/1:626:4970 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9ddaa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:627:4972 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:627 state:D stack:0 pid:4972 tgid:4972 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:8541ec00
r4:8541ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb133000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85485b8c r4:85485800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85485b8c r4:852e3d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541ec00 r8:852e3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3d80 r8:80287e08 r7:eb539e60 r6:852e3e80 r5:8541ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb541fb0 to 0xeb541ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461280
INFO: task kworker/1:627:4972 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9ddaa000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:628:4974 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:628 state:D stack:0 pid:4974 tgid:4974 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb545d84 r8:00000002 r7:60000013 r6:eb545d8c r5:8541a400
r4:8541a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8541a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb545e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461400
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8541a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb15f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548638c r4:85486000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548638c r4:852e3f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8541a400 r8:852e3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852e3f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852e3f80 r8:80287e08 r7:eb539e60 r6:84dfce00 r5:8541a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb545fb0 to 0xeb545ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854612c0
INFO: task kworker/1:628:4974 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9de83000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:629:4976 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:629 state:D stack:0 pid:4976 tgid:4976 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:85420000
r4:85420000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85420000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85420000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2d5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85486f8c r4:85486c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85486f8c r4:85465180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85420000 r8:854651ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465180 r8:80287e08 r7:eb545e60 r6:85465000 r5:85420000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb549fb0 to 0xeb549ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854613c0
INFO: task kworker/1:629:4976 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9e2be000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:630:4977 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:630 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:85420c00
r4:85420c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85420c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854613c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85420c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb173000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548678c r4:85486400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548678c r4:85465100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85420c00 r8:8546512c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465100 r8:80287e08 r7:eb549e60 r6:85465080 r5:85420c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb551fb0 to 0xeb551ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461600
INFO: task kworker/1:630:4977 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9e36e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:631:4980 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:631 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:85421800
r4:85421800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85421800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85421800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85486b8c r4:85486800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85486b8c r4:85465300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85421800 r8:8546532c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465300 r8:80287e08 r7:eb549e60 r6:85465400 r5:85421800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb54dfb0 to 0xeb54dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461740
INFO: task kworker/1:631:4980 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9e662000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:632:4982 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:632 state:D stack:0 pid:4982 tgid:4982 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:85423000
r4:85423000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85423000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461ac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85423000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548738c r4:85487000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548738c r4:85465200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85423000 r8:8546522c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465200 r8:80287e08 r7:eb549e60 r6:85465480 r5:85423000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb555fb0 to 0xeb555ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461800
INFO: task kworker/1:632:4982 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9e80c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:633:4984 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:633 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb559d84 r8:00000002 r7:60000113 r6:eb559d8c r5:85423c00
r4:85423c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85423c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85423c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2ed000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8548778c r4:85487400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8548778c r4:85465380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85423c00 r8:854653ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465380 r8:80287e08 r7:eb555e60 r6:85465580 r5:85423c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb559fb0 to 0xeb559ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461a80
INFO: task kworker/1:633:4984 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9eb8a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:634:4986 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:634 state:D stack:0 pid:4986 tgid:4986 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000013 r6:eb55dd8c r5:85424800
r4:85424800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85424800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85424800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85487b8c r4:85487800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85487b8c r4:85465280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85424800 r8:854652ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465280 r8:80287e08 r7:eb559e60 r6:85465600 r5:85424800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb55dfb0 to 0xeb55dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461c00
INFO: task kworker/1:634:4986 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9edad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:635:4988 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:635 state:D stack:0 pid:4988 tgid:4988 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:85425400
r4:85425400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85425400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85425400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb311000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85487f8c r4:85487c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85487f8c r4:85465680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85425400 r8:854656ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465680 r8:80287e08 r7:eb55de60 r6:85465780 r5:85425400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb561fb0 to 0xeb561ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461d00
INFO: task kworker/1:635:4988 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9f0d7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:636:4990 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:636 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb565d84 r8:00000002 r7:60000013 r6:eb565d8c r5:85426000
r4:85426000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85426000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85426000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb34f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549438c r4:85494000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549438c r4:85465500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85426000 r8:8546552c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465500 r8:80287e08 r7:eb561e60 r6:85465880 r5:85426000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb565fb0 to 0xeb565ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475000
INFO: task kworker/1:636:4990 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9f5f3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:637:4992 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:637 state:D stack:0 pid:4992 tgid:4992 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:85426c00
r4:85426c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85426c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85426c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb365000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549478c r4:85494400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549478c r4:85465700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85426c00 r8:8546572c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465700 r8:80287e08 r7:eb565e60 r6:85465800 r5:85426c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb569fb0 to 0xeb569ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475000
INFO: task kworker/1:637:4992 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9f7f6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:638:4994 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:638 state:D stack:0 pid:4994 tgid:4994 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:85422400
r4:85422400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85422400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85422400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3b9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85494b8c r4:85494800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85494b8c r4:85465900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85422400 r8:8546592c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465900 r8:80287e08 r7:eb569e60 r6:85465a00 r5:85422400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb56dfb0 to 0xeb56dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475200
INFO: task kworker/1:638:4994 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: 9fb6c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:639:4996 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:639 state:D stack:0 pid:4996 tgid:4996 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:85428000
r4:85428000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85428000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854756c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dff13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549538c r4:85495000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549538c r4:85465b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85428000 r8:85465bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465b80 r8:80287e08 r7:eb56de60 r6:85465c00 r5:85428000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb571fb0 to 0xeb571ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854752c0
INFO: task kworker/1:639:4996 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a0247000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:640:4998 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:640 state:D stack:0 pid:4998 tgid:4998 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:85428c00
r4:85428c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85428c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85428c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85494f8c r4:85494c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85494f8c r4:85465a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85428c00 r8:85465aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465a80 r8:80287e08 r7:eb571e60 r6:85465c80 r5:85428c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb575fb0 to 0xeb575ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475600
INFO: task kworker/1:640:4998 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a0247000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:641:5000 blocked for more than 468 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:641 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb579d84 r8:00000002 r7:60000113 r6:eb579d8c r5:85429800
r4:85429800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85429800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85429800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e06e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549578c r4:85495400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549578c r4:85465d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85429800 r8:85465d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465d00 r8:80287e08 r7:eb571e60 r6:85465e00 r5:85429800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb579fb0 to 0xeb579ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475600
INFO: task kworker/1:641:5000 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a056c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:642:5002 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:642 state:D stack:0 pid:5002 tgid:5002 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:8542a400
r4:8542a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854759c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85495b8c r4:85495800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85495b8c r4:85465980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542a400 r8:854659ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465980 r8:80287e08 r7:eb579e60 r6:85465b00 r5:8542a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb57dfb0 to 0xeb57dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475740
INFO: task kworker/1:642:5002 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a0ae3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:643:5004 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:643 state:D stack:0 pid:5004 tgid:5004 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:8542b000
r4:8542b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542b000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85339f8c r4:85339c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85339f8c r4:85465e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542b000 r8:85465eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465e80 r8:80287e08 r7:eb57de60 r6:85465d80 r5:8542b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb581fb0 to 0xeb581ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475940
INFO: task kworker/1:643:5004 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a0dd7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:644:5007 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:644 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb58dd84 r8:00000002 r7:60000013 r6:eb58dd8c r5:8542d400
r4:8542d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eac85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85495f8c r4:85495c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85495f8c r4:85465f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542d400 r8:85465fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85465f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85465f80 r8:80287e08 r7:eb581e60 r6:85465f00 r5:8542d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb58dfb0 to 0xeb58dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475c80
INFO: task kworker/1:644:5007 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1234000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:645:5009 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:645 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:8542bc00
r4:8542bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85475e80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead89000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549638c r4:85496000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549638c r4:85060100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542bc00 r8:8506012c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060100 r8:80287e08 r7:eb58de60 r6:85060180 r5:8542bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb589fb0 to 0xeb589ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475dc0
INFO: task kworker/1:645:5009 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1595000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:646:5011 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:646 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:85433c00
r4:85433c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85433c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84574740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85433c00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadcb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549678c r4:85496400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549678c r4:85060280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85433c00 r8:850602ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060280 r8:80287e08 r7:eb589e60 r6:852edc00 r5:85433c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb595fb0 to 0xeb595ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84574680
INFO: task kworker/1:646:5011 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1860000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:647:5013 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:647 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:85436000
r4:85436000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85436000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85461e80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85436000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf9b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85496b8c r4:85496800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85496b8c r4:85060000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85436000 r8:8506002c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060000 r8:80287e08 r7:eb595e60 r6:852edc80 r5:85436000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb59dfb0 to 0xeb59dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85475b80
INFO: task kworker/1:647:5013 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1c28000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:648:5015 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:648 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5a1d84 r8:00000002 r7:60000113 r6:eb5a1d8c r5:85448000
r4:85448000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85448000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85448000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb163000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549738c r4:85497000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549738c r4:85060300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85448000 r8:8506032c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060300 r8:80287e08 r7:eb59de60 r6:852edd80 r5:85448000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a1fb0 to 0xeb5a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461980
INFO: task kworker/1:648:5015 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1e86000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:649:5016 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:649 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:85448c00
r4:85448c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85448c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853062c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85448c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1af000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8549778c r4:85497400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8549778c r4:85060080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85448c00 r8:850600ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060080 r8:80287e08 r7:eb5a1e60 r6:852ede00 r5:85448c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a5fb0 to 0xeb5a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85461980
INFO: task kworker/1:649:5016 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a1e86000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:650:5020 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:650 state:D stack:0 pid:5020 tgid:5020 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb599d84 r8:00000002 r7:60000013 r6:eb599d8c r5:8542e000
r4:8542e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853067c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a038c r4:854a0000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a038c r4:85060200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542e000 r8:8506022c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060200 r8:80287e08 r7:eb5a5e60 r6:85060380 r5:8542e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb599fb0 to 0xeb599ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306500
INFO: task kworker/1:650:5020 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a21c0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:651:5021 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:651 state:D stack:0 pid:5021 tgid:5021 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:8542ec00
r4:8542ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306400
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85497b8c r4:85497800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85497b8c r4:85060400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542ec00 r8:8506042c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060400 r8:80287e08 r7:eb599e60 r6:85060480 r5:8542ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5a9fb0 to 0xeb5a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306500
INFO: task kworker/1:651:5021 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2501000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:652:5024 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:652 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5add84 r8:00000002 r7:60000113 r6:eb5add8c r5:8542c800
r4:8542c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8542c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8542c800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1e7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85497f8c r4:85497c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85497f8c r4:85060500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8542c800 r8:8506052c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060500 r8:80287e08 r7:eb599e60 r6:85060680 r5:8542c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5adfb0 to 0xeb5adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306600
INFO: task kworker/1:652:5024 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2823000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:653:5026 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:653 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000013 r6:eb5b1d8c r5:846a6c00
r4:846a6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:846a6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:846a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb211000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a078c r4:854a0400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a078c r4:85060580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:846a6c00 r8:850605ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060580 r8:80287e08 r7:eb599e60 r6:85060780 r5:846a6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b1fb0 to 0xeb5b1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306780
INFO: task kworker/1:653:5026 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2bb0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:654:5028 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:654 state:D stack:0 pid:5028 tgid:5028 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:85410000
r4:85410000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85410000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85410000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb22d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a0b8c r4:854a0800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a0b8c r4:85060600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85410000 r8:8506062c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060600 r8:80287e08 r7:eb5b1e60 r6:85060880 r5:85410000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b5fb0 to 0xeb5b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306900
INFO: task kworker/1:654:5028 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a2f15000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:655:5031 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:655 state:D stack:0 pid:5031 tgid:5031 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:85410c00
r4:85410c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85410c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85410c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb23d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a0f8c r4:854a0c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a0f8c r4:85060700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85410c00 r8:8506072c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060700 r8:80287e08 r7:eb5b5e60 r6:85060800 r5:85410c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5b9fb0 to 0xeb5b9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306b00
INFO: task kworker/1:655:5031 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a337b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:656:5033 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:656 state:D stack:0 pid:5033 tgid:5033 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5c1d84 r8:00000002 r7:60000113 r6:eb5c1d8c r5:85411800
r4:85411800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85411800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85411800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb261000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a138c r4:854a1000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a138c r4:85060900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85411800 r8:8506092c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060900 r8:80287e08 r7:eb5b9e60 r6:85060980 r5:85411800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c1fb0 to 0xeb5c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306c40
INFO: task kworker/1:656:5033 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a3694000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:657:5034 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:657 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:85412400
r4:85412400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85412400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85412400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2b3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a1f8c r4:854a1c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a1f8c r4:85060a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85412400 r8:85060a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060a00 r8:80287e08 r7:eb5c1e60 r6:85060a80 r5:85412400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb591fb0 to 0xeb591ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306c40
INFO: task kworker/1:657:5034 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a39ea000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:658:5036 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:658 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:85413000
r4:85413000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85413000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85306f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85413000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb271000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a178c r4:854a1400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a178c r4:85060b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85413000 r8:85060b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060b00 r8:80287e08 r7:eb591e60 r6:85060c80 r5:85413000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c5fb0 to 0xeb5c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85306ec0
INFO: task kworker/1:658:5036 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a3e12000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:659:5038 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:659 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5c9d84 r8:00000002 r7:60000013 r6:eb5c9d8c r5:85413c00
r4:85413c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85413c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85413c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb28b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a1b8c r4:854a1800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a1b8c r4:85060b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85413c00 r8:85060bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060b80 r8:80287e08 r7:eb591e60 r6:85060d00 r5:85413c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5c9fb0 to 0xeb5c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc0c0
INFO: task kworker/1:659:5038 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a4068000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:660:5040 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:660 state:D stack:0 pid:5040 tgid:5040 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000113 r6:eb5cdd8c r5:85414800
r4:85414800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85414800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85414800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3cb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a238c r4:854a2000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a238c r4:85060d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85414800 r8:85060dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060d80 r8:80287e08 r7:eb591e60 r6:85060c00 r5:85414800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5cdfb0 to 0xeb5cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc0c0
INFO: task kworker/1:660:5040 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a412d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:661:5043 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:661 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:85415400
r4:85415400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85415400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85415400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3d5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a278c r4:854a2400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a278c r4:85060e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85415400 r8:85060e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060e00 r8:80287e08 r7:eb5cde60 r6:85060f00 r5:85415400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d1fb0 to 0xeb5d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc200
INFO: task kworker/1:661:5043 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a4575000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:662:5044 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:662 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5d5d84 r8:00000002 r7:60000013 r6:eb5d5d8c r5:85416000
r4:85416000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85416000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dcb00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85416000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb449000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a3b8c r4:854a3800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a3b8c r4:85060f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85416000 r8:85060fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85060f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85060f80 r8:80287e08 r7:eb5d1e60 r6:85060e80 r5:85416000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d5fb0 to 0xeb5d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc2c0
INFO: task kworker/1:662:5044 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a4a22000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:663:5046 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:663 state:D stack:0 pid:5046 tgid:5046 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:85416c00
r4:85416c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85416c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc540
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85416c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3e3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a2b8c r4:854a2800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a2b8c r4:84fa5100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85416c00 r8:84fa512c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5100 r8:80287e08 r7:eb5d5e60 r6:84fa5180 r5:85416c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5d9fb0 to 0xeb5d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc500
INFO: task kworker/1:663:5046 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a4d28000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:664:5048 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:664 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:854f0000
r4:854f0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854f0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb423000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a2f8c r4:854a2c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a2f8c r4:84fa5000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f0000 r8:84fa502c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5000 r8:80287e08 r7:eb5d5e60 r6:84fa5280 r5:854f0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e1fb0 to 0xeb5e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc5c0
INFO: task kworker/1:664:5048 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a50b3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:665:5050 blocked for more than 469 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:665 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:854f0c00
r4:854f0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854f0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb431000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a338c r4:854a3000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a338c r4:84fa5080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f0c00 r8:84fa50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5080 r8:80287e08 r7:eb5d5e60 r6:84fa5380 r5:854f0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5e5fb0 to 0xeb5e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dc7c0
INFO: task kworker/1:665:5050 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a50b3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:84e0be80
r4:84d87ac0
r4:854f1800
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc980
r7:ddde2d80 r6:83018200 r5:854a378c r4:84fa5200
INFO: task kworker/1:666:5052 is blocked on a mutex likely owned by task kworker/0:123:3540.
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r4:84d87ac0
r5:854f2400 r4:8291a680
r9:83018205 r8:854f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f2400 r8:84fa532c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5300 r8:80287e08 r7:eb5d5e60 r6:84fa5580 r5:854f2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb5ddfb0 to 0xeb5ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:847dcac0
INFO: task kworker/1:667:5054 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a5dda000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r5:854a3f8c r4:854a3c00
r10:00000000 r9:84fa5400 r8:80287e08 r7:eb5dde60 r6:84fa5500 r5:854f3000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
INFO: task kworker/1:669:5058 blocked for more than 469 seconds.
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Call trace:
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
r4:854f5400
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb603000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a8b8c r4:854a8800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a8b8c r4:84fa5680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f5400 r8:84fa56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:671:5062 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:671 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb601d84 r8:00000002 r7:60000113 r6:eb601d8c r5:854f6000
r4:854f6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854f6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb609000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a8f8c r4:854a8c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a8f8c r4:84fa5880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f6000 r8:84fa58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5880 r8:80287e08 r7:eb5f1e60 r6:84fa5700 r5:854f6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb601fb0 to 0xeb601ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f88080
INFO: task kworker/1:671:5062 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a69d0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:672:5064 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:672 state:D stack:0 pid:5064 tgid:5064 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:854f6c00
r4:854f6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854f6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88300
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb617000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a938c r4:854a9000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a938c r4:84fa5900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f6c00 r8:84fa592c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5900 r8:80287e08 r7:eb601e60 r6:84fa5a80 r5:854f6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb60dfb0 to 0xeb60dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f88300
INFO: task kworker/1:672:5064 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a6d1b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:673:5067 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:673 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb615d84 r8:00000002 r7:60000013 r6:eb615d8c r5:854f3c00
r4:854f3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854f3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb615e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb62b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a9b8c r4:854a9800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a9b8c r4:84fa5980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f3c00 r8:84fa59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5980 r8:80287e08 r7:eb60de60 r6:84fa5a00 r5:854f3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb615fb0 to 0xeb615ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f88540
INFO: task kworker/1:673:5067 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a6d1b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:674:5068 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:674 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb629d84 r8:00000002 r7:60000013 r6:eb629d8c r5:854f8000
r4:854f8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854f8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854a978c r4:854a9400
r7:ddde2d80 r6:83018200 r5:854a978c r4:84fa5b00
r10:00000000 r9:84fa5b00 r8:80287e08 r7:eb615e60 r6:84fa5b80 r5:854f8000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:675:5071 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:675 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:eb635d84 r8:00000002 r7:60000013 r6:eb635d8c r5:854f8c00
r4:00000000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:854aab8c r4:854aa800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:854f8c00 r8:84fa5c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:676 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:854a9f8c r4:854a9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854a9f8c r4:84fa5c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854f9800 r8:84fa5cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5c80 r8:80287e08 r7:eb635e60 r6:84fa5e80 r5:854f9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb63dfb0 to 0xeb63dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f888c0
INFO: task kworker/1:676:5073 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a7a8f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:677:5075 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:ddde2d80 r6:83018200 r5:854aa38c r4:84fa5d00
r10:00000000 r9:84fa5d00 r8:80287e08 r7:eb635e60 r6:84fa5e00 r5:854fb000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:85449800
r4:85449800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85449800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d523c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85449800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb659000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533ab8c r4:8533a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533ab8c r4:852ede80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85449800 r8:852edeac r7:82804d40 r6:dddced80 r5:dddceda0
r4:852ede80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ede80 r8:80287e08 r7:eb495e60 r6:852edf00 r5:85449800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb649fb0 to 0xeb649ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d52600
INFO: task kworker/0:296:5076 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a7e5f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:297:5078 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:297 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:8544b000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08
r9:83018005 r8:8544b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
r5:8533b78c r4:8533b400
r7:dddced80 r6:83018000 r5:8533b78c r4:84d85000
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:678:5079 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:678 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb621d84 r8:00000002 r7:60000013 r6:eb621d8c r5:8544c800
r4:8544c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb621e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88fc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8544c800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e002f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854aa78c r4:854aa400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854aa78c r4:84fa5f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544c800 r8:84fa5f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5f00 r8:80287e08 r7:eb635e60 r6:84d85100 r5:8544c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb621fb0 to 0xeb621ff8)
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:298:5084 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:298 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:8544ec00
r4:8544ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8544ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb02b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b538c r4:854b5000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854b538c r4:84d85180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544ec00 r8:84d851ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d85180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d85180 r8:80287e08 r7:eb65de60 r6:84d85300 r5:8544ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4d9fb0 to 0xeb4d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d84040
INFO: task kworker/0:298:5084 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a8a45000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:679:5086 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:679 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:8544d400
r4:8544d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb66de08
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r4:00000000
r5:00001000 r4:e4889000
r5:854aaf8c r4:854aac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854aaf8c r4:84d5b080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544d400 r8:84d5b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:84d5b080 r8:80287e08 r7:eb635e60 r6:84d85200 r5:8544d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb66dfb0 to 0xeb66dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60100
INFO: task kworker/1:679:5086 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a8f08000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:680:5087 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:680 state:D stack:0 pid:5087 tgid:5087 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:8544a400
r4:8544a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f609c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8544a400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaed9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b478c r4:854b4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b478c r4:84d5b100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544a400 r8:84d5b12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b100 r8:80287e08 r7:eb66de60 r6:84d85280 r5:8544a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb671fb0 to 0xeb671ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60100
INFO: task kworker/1:680:5087 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9229000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:681:5089 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:681 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb679d84 r8:00000002 r7:60000013 r6:eb679d8c r5:84e98c00
r4:84e98c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e98c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb679e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60280
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e98c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ab38c r4:854ab000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ab38c r4:84d5b200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e98c00 r8:84d5b22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b200 r8:80287e08 r7:eb671e60 r6:84d85380 r5:84e98c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb679fb0 to 0xeb679ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60100
INFO: task kworker/1:681:5089 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9229000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:682:5091 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:682 state:D stack:0 pid:5091 tgid:5091 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:84e99800
r4:84e99800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e99800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e99800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ead2b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ab78c r4:854ab400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ab78c r4:84d5b180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e99800 r8:84d5b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b180 r8:80287e08 r7:eb671e60 r6:84d85400 r5:84e99800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb67dfb0 to 0xeb67dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f601c0
INFO: task kworker/1:682:5091 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9700000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:683:5092 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:683 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb681d84 r8:00000002 r7:60000113 r6:eb681d8c r5:84e9a400
r4:84e9a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e9a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f605c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae35000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854abb8c r4:854ab800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854abb8c r4:84d5b300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e9a400 r8:84d5b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b300 r8:80287e08 r7:eb671e60 r6:84d85480 r5:84e9a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb681fb0 to 0xeb681ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f606c0
INFO: task kworker/1:683:5092 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a99c5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84e9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000
r7:ddde2d80 r6:83018200 r5:854abf8c r4:84d5b380
r4:84d5b380
r10:00000000 r9:84d5b380 r8:80287e08 r7:eb671e60 r6:84d85500 r5:84e9b000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a99c5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:685:5098 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:685 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb689d84 r8:00000002 r7:60000013 r6:eb689d8c r5:84e9bc00
r4:84e9bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e9bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f607c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaea5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b438c r4:854b4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b438c r4:84d5b000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e9bc00 r8:84d5b02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b000 r8:80287e08 r7:eb671e60 r6:84d85580 r5:84e9bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb689fb0 to 0xeb689ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60ac0
INFO: task kworker/1:685:5098 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9be7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:686:5099 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:686 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb68dd84 r8:00000002 r7:60000013 r6:eb68dd8c r5:84e9c800
r4:84e9c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e9c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60b00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b4b8c r4:854b4800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b4b8c r4:84d5b280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e9c800 r8:84d5b2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b280 r8:80287e08 r7:eb671e60 r6:84d85600 r5:84e9c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb68dfb0 to 0xeb68dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60840
INFO: task kworker/1:686:5099 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9d5f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:687:5101 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:687 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb691d84 r8:00000002 r7:60000013 r6:eb691d8c r5:84e9d400
r4:84e9d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e9d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60c80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb013000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b4f8c r4:854b4c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b4f8c r4:84d5b400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e9d400 r8:84d5b42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b400 r8:80287e08 r7:eb68de60 r6:84d85680 r5:84e9d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb691fb0 to 0xeb691ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60a40
INFO: task kworker/1:687:5101 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: a9f98000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:688:5103 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:688 state:D stack:0 pid:5103 tgid:5103 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb695d84 r8:00000002 r7:60000013 r6:eb695d8c r5:84e9e000
r4:84e9e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e9e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb049000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b578c r4:854b5400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b578c r4:84d5b580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e9e000 r8:84d5b5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b580 r8:80287e08 r7:eb691e60 r6:84d85700 r5:84e9e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb695fb0 to 0xeb695ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60c40
INFO: task kworker/1:688:5103 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aa268000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:689:5106 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:689 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb675d84 r8:00000002 r7:60000113 r6:eb675d8c r5:84e9ec00
r4:84e9ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e9ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f88ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e9ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb065000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b5b8c r4:854b5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b5b8c r4:84d5b600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e9ec00 r8:84d5b62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b600 r8:80287e08 r7:eb695e60 r6:84d85780 r5:84e9ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb675fb0 to 0xeb675ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60800
INFO: task kworker/1:689:5106 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aa268000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:690:5108 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:690 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb699d84 r8:00000002 r7:60000013 r6:eb699d8c r5:84e98000
r4:84e98000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e98000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e98000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b5f8c r4:854b5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b5f8c r4:84d5b500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e98000 r8:84d5b52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b500 r8:80287e08 r7:eb675e60 r6:84d85800 r5:84e98000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb699fb0 to 0xeb699ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f60f80
INFO: task kworker/1:690:5108 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aa4af000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:299:5109 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:299 state:D stack:0 pid:5109 tgid:5109 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:8544bc00
r4:8544bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r4:00000000
r5:00001000 r4:eb0eb000
r5:8533b38c r4:8533b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8544bc00 r8:84d858ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d85880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d85880 r8:80287e08 r7:eb65de60 r6:84d85900 r5:8544bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb69dfb0 to 0xeb69dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d84b80
INFO: task kworker/0:299:5109 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aa556000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:691:5111 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:691 state:D stack:0 pid:5111 tgid:5111 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb665d84 r8:00000002 r7:60000013 r6:eb665d8c r5:854fc800
r4:854fc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854fc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83280
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b638c r4:854b6000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b638c r4:84d5b700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854fc800 r8:84d5b72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b700 r8:80287e08 r7:eb699e60 r6:84d5b780 r5:854fc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb665fb0 to 0xeb665ff8)
5fa0: 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:00000000
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:692:5112 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:692 state:D stack:0 pid:5112 tgid:5112 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6a1d84 r8:00000002 r7:60000113 r6:eb6a1d8c r5:854fd400
r4:854fd400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854fd400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb103000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b678c r4:854b6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b678c r4:84d5b680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854fd400 r8:84d5b6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b680 r8:80287e08 r7:eb665e60 r6:84d5b880 r5:854fd400
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:693:5117 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:693 state:D stack:0 pid:5117 tgid:5117 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:854fa400
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08
r4:00000000
r5:854b6b8c r4:854b6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aae82000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:694:5118 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:694 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:854fec00
r4:854fec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854fec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08
r4:00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d837c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb147000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b6f8c r4:854b6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b6f8c r4:84d5b980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854fec00 r8:84d5b9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b980 r8:80287e08 r7:eb6a5e60 r6:84d5ba80 r5:854fec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb4bdfb0 to 0xeb4bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d83840
INFO: task kworker/1:694:5118 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ab101000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:695:5120 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:695 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6a9d84 r8:00000002 r7:60000013 r6:eb6a9d8c r5:854fe000
r4:854fe000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854fe000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb161000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b738c r4:854b7000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b738c r4:84d5b800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854fe000 r8:84d5b82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5b800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5b800 r8:80287e08 r7:eb4bde60 r6:84d5ba00 r5:854fe000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6a9fb0 to 0xeb6a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d83680
INFO: task kworker/1:695:5120 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ab220000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:696:5122 blocked for more than 470 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:696 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6b1d84 r8:00000002 r7:60000013 r6:eb6b1d8c r5:85500000
r4:85500000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85500000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85500000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b778c r4:854b7400
r7:ddde2d80 r6:83018200 r5:854b778c r4:84d5bb00
r10:00000000 r9:84d5bb00 r8:80287e08 r7:eb6a9e60 r6:84d5bc00 r5:85500000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ab81a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:697:5124 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:697 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85500c00
r4:85500c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85500c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83dc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85500c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb303000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b7b8c r4:854b7800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b7b8c r4:84d5bc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85500c00 r8:84d5bcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5bc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5bc80 r8:80287e08 r7:eb6b1e60 r6:84d5bb80 r5:85500c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6b5fb0 to 0xeb6b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d839c0
INFO: task kworker/1:697:5124 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: abbd7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:300:5126 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:300 state:D stack:0 pid:5126 tgid:5126 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:84d10c00
r4:84d10c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d10c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r4:00000000
r5:00001000 r4:eb2eb000
r5:8533bb8c r4:8533b800
r7:dddced80 r6:83018000 r5:8533bb8c r4:84d85980
r10:61c88647 r9:84d10c00 r8:84d859ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d85980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d85980 r8:80287e08 r7:eb65de60 r6:84d85a00 r5:84d10c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6adfb0 to 0xeb6adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ac0c8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:301:5127 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:301 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:84d11800
r4:84d11800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d11800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464400
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d11800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb329000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8533bf8c r4:8533bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8533bf8c r4:84d85a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d11800 r8:84d85aac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84d85a80 r8:80287e08 r7:eb6ade60 r6:84d85b00 r5:84d11800
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ac359000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:698:5130 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:698 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:84d12400
r4:84d12400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d12400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60f80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d12400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bc38c r4:854bc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bc38c r4:84d5bd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d12400 r8:84d5bd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5bd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5bd00 r8:80287e08 r7:eb6b5e60 r6:84d85b80 r5:84d12400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c5fb0 to 0xeb6c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d83d80
INFO: task kworker/1:698:5130 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:302:5131 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:302 state:D stack:0 pid:5131 tgid:5131 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6c9d84 r8:00000002 r7:60000013 r6:eb6c9d8c r5:84d13c00
r4:84d13c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d13c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eae17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cc38c r4:854cc000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cc38c r4:84d85c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d13c00 r8:84d85c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d85c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d85c00 r8:80287e08 r7:eb6b9e60 r6:84d85c80 r5:84d13c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6c9fb0 to 0xeb6c9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85464200
INFO: task kworker/0:302:5131 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: acbd5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:303:5133 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:303 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6cdd84 r8:00000002 r7:60000113 r6:eb6cdd8c r5:84d13000
r4:84d13000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d13000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d13000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea9c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466a38c r4:8466a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466a38c r4:84d85d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d13000 r8:84d85d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:84d85d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d85d00 r8:80287e08 r7:eb6c9e60 r6:84d85e80 r5:84d13000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6cdfb0 to 0xeb6cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85464100
INFO: task kworker/0:303:5133 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ad18b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:699:5134 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:699 state:D stack:0 pid:5134 tgid:5134 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000013 r6:eb6d1d8c r5:84d15400
r4:84d15400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d15400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84d83f00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d15400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb38d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854b7f8c r4:854b7c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854b7f8c r4:84d5be00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d15400 r8:84d5be2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5be00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5be00 r8:80287e08 r7:eb6c5e60 r6:84d85d80 r5:84d15400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d1fb0 to 0xeb6d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d83d40
INFO: task kworker/1:699:5134 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ad18b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:700:5137 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:700 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000013 r6:eb6ddd8c r5:84d16c00
r4:84d16c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d16c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d16c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bd78c r4:854bd400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bd78c r4:84d5be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d16c00 r8:84d5beac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5be80 r8:80287e08 r7:eb6c5e60 r6:84d85e00 r5:84d16c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6ddfb0 to 0xeb6ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd000
INFO: task kworker/1:700:5137 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: adf1d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:701:5139 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:701 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6e5d84 r8:00000002 r7:60000013 r6:eb6e5d8c r5:84d16000
r4:84d16000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d16000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d16000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bc78c r4:854bc400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bc78c r4:84d5bd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d16000 r8:84d5bdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5bd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5bd80 r8:80287e08 r7:eb6dde60 r6:84d85f00 r5:84d16000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e5fb0 to 0xeb6e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd000
INFO: task kworker/1:701:5139 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: adf1d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:702:5140 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:702 state:D stack:0 pid:5140 tgid:5140 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6e9d84 r8:00000002 r7:60000113 r6:eb6e9d8c r5:84d14800
r4:84d14800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d14800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd1c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d14800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bcb8c r4:854bc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bcb8c r4:84d5bf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d14800 r8:84d5bf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5bf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5bf00 r8:80287e08 r7:eb6dde60 r6:84d85f80 r5:84d14800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6e9fb0 to 0xeb6e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd240
INFO: task kworker/1:702:5140 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: adf1d000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:703:5142 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:703 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6f1d84 r8:00000002 r7:60000013 r6:eb6f1d8c r5:84d10000
r4:84d10000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d10000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd2c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d10000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bcf8c r4:854bcc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bcf8c r4:852ff000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d10000 r8:852ff02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff000 r8:80287e08 r7:eb6dde60 r6:852edf80 r5:84d10000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6f1fb0 to 0xeb6f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd180
INFO: task kworker/1:703:5142 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ae48a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:704:5144 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:704 state:D stack:0 pid:5144 tgid:5144 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6f9d84 r8:00000002 r7:60000113 r6:eb6f9d8c r5:85458c00
r4:85458c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85458c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85458c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4e5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bd38c r4:854bd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bd38c r4:852ff080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85458c00 r8:852ff0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff080 r8:80287e08 r7:eb6dde60 r6:852edb80 r5:85458c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6f9fb0 to 0xeb6f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd300
INFO: task kworker/1:704:5144 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aecc2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:705:5146 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:705 state:D stack:0 pid:5146 tgid:5146 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:85459800
r4:85459800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85459800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd9c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85459800 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacb3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854be38c r4:854be000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854be38c r4:852ff180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85459800 r8:852ff1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff180 r8:80287e08 r7:eb6dde60 r6:852edd00 r5:85459800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb625fb0 to 0xeb625ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd5c0
INFO: task kworker/1:705:5146 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: aecc2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:706:5149 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:706 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6f5d84 r8:00000002 r7:60000013 r6:eb6f5d8c r5:8545a400
r4:8545a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0135000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bdb8c r4:854bd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bdb8c r4:852ff280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545a400 r8:852ff2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff280 r8:80287e08 r7:eb625e60 r6:85363000 r5:8545a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6f5fb0 to 0xeb6f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd740
INFO: task kworker/1:706:5149 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: af438000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:707:5153 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:707 state:D stack:0 pid:5153 tgid:5153 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6bdd84 r8:00000002 r7:60000013 r6:eb6bdd8c r5:8545b000
r4:8545b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfd940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eabdd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bdf8c r4:854bdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bdf8c r4:852ff300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545b000 r8:852ff32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff300 r8:80287e08 r7:eb625e60 r6:85363180 r5:8545b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6bdfb0 to 0xeb6bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd900
INFO: task kworker/1:707:5153 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: af62a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:8545bc00 r8:8536322c r7:82804d40 r6:dddced80 r5:dddceda0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:708:5156 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:708 state:D stack:0 pid:5156 tgid:5156 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb705d84 r8:00000002 r7:60000113 r6:eb705d8c r5:8545d400
r4:8545d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfdac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadc3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854be78c r4:854be400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854be78c r4:852ff380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545d400 r8:852ff3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff380 r8:80287e08 r7:eb625e60 r6:85363100 r5:8545d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb705fb0 to 0xeb705ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfd740
INFO: task kworker/1:708:5156 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b00c3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:854bf38c r4:854bf000
r7:ddde2d80 r6:83018200 r5:854bf38c r4:852ff100
r10:00000000 r9:852ff100 r8:80287e08 r7:eb705e60 r6:85363280 r5:8545c800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:710:5160 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:710 state:D stack:0 pid:5160 tgid:5160 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb715d84 r8:00000002 r7:60000013 r6:eb715d8c r5:8545e000
r4:8545e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb715e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfdc80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaf9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854beb8c r4:854be800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854beb8c r4:852ff480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545e000 r8:852ff4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff480 r8:80287e08 r7:eb711e60 r6:85363300 r5:8545e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb715fb0 to 0xeb715ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84dfdbc0
INFO: task kworker/1:710:5160 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b0551000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:711:5161 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:711 state:D stack:0 pid:5161 tgid:5161 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb6c1d84 r8:00000002 r7:60000113 r6:eb6c1d8c r5:85501800
r4:85501800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85501800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84dfde00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85501800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eafff000
r5:854bef8c r4:854bec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:85501800 r8:852ff42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r10:8291a684 r9:eb70dd84 r8:00000002 r7:60000113 r6:eb70dd8c r5:85502400
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85464200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85502400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bf78c r4:854bf400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bf78c r4:852ff200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85502400 r8:852ff22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff200 r8:80287e08 r7:eb711e60 r6:852ff600 r5:85502400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb70dfb0 to 0xeb70dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85464680
INFO: task kworker/1:712:5164 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b0c0c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:713 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb701e08
r9:83018205 r8:85503c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
r5:854bfb8c r4:854bf800
r10:61c88647 r9:85503c00 r8:852ff6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85464680
INFO: task kworker/1:713:5166 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b0c0c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb71de08
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:8536438c r4:85364000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:852ff700
Exception stack(0xeb71dfb0 to 0xeb71dff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:dffe1dc0
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:85ef9f8c r4:85ef9c00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
INFO: task kworker/1:715:5170 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:715 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb729d84 r8:00000002 r7:60000013 r6:eb729d8c r5:85505400
r4:85505400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85505400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb729e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85505400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb223000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854bff8c r4:854bfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854bff8c r4:852ff880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85505400 r8:852ff8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff880 r8:80287e08 r7:eb71de60 r6:852ff980 r5:85505400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb729fb0 to 0xeb729ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85383100
INFO: task kworker/1:715:5170 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b11df000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:716:5171 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:716 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb721d84 r8:00000002 r7:60000013 r6:eb721d8c r5:85506000
r4:85506000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85506000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85506000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb26f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536478c r4:85364400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536478c r4:852ff780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85506000 r8:852ff7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ff780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ff780 r8:80287e08 r7:eb71de60 r6:852ff900 r5:85506000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb721fb0 to 0xeb721ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85383100
INFO: task kworker/1:716:5171 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b15ce000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:717:5174 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:717 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:85506c00
r4:85506c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85506c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85506c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb28d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85364b8c r4:85364800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85364b8c r4:852ffa00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85506c00 r8:852ffa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffa00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffa00 r8:80287e08 r7:eb721e60 r6:852ffb00 r5:85506c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb72dfb0 to 0xeb72dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853834c0
INFO: task kworker/1:717:5174 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b187b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:718:5176 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:718 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:85458000
r4:85458000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85458000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85458000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85364f8c r4:85364c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85364f8c r4:852ffb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85458000 r8:852ffbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffb80 r8:80287e08 r7:eb72de60 r6:85363380 r5:85458000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb739fb0 to 0xeb739ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853835c0
INFO: task kworker/1:718:5176 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b1ca2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:719:5178 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:719 state:D stack:0 pid:5178 tgid:5178 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb741d84 r8:00000002 r7:60000113 r6:eb741d8c r5:83878000
r4:83878000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83878000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83878000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536538c r4:85365000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536538c r4:852ffa80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83878000 r8:852ffaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffa80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffa80 r8:80287e08 r7:eb739e60 r6:85363400 r5:83878000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb741fb0 to 0xeb741ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85383740
INFO: task kworker/1:719:5178 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b1ca2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:720:5180 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:720 state:D stack:0 pid:5180 tgid:5180 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb749d84 r8:00000002 r7:60000013 r6:eb749d8c r5:83879800
r4:83879800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83879800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83879800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb447000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85365f8c r4:85365c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85365f8c r4:852ffd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83879800 r8:852ffd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffd00 r8:80287e08 r7:eb741e60 r6:85363480 r5:83879800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb749fb0 to 0xeb749ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853838c0
INFO: task kworker/1:720:5180 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b219f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:721:5182 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:721 state:D stack:0 pid:5182 tgid:5182 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:8387b000
r4:8387b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383a40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8387b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536578c r4:85365400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536578c r4:852ffd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387b000 r8:852ffdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffd80 r8:80287e08 r7:eb749e60 r6:85363500 r5:8387b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb751fb0 to 0xeb751ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853838c0
INFO: task kworker/1:721:5182 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b2347000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:722:5183 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:722 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:83878c00
r4:83878c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:83878c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:83878c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb435000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85365b8c r4:85365800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85365b8c r4:852ffe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:83878c00 r8:852ffe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffe00 r8:80287e08 r7:eb749e60 r6:85363580 r5:83878c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb755fb0 to 0xeb755ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853838c0
INFO: task kworker/1:722:5183 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b2633000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:723:5187 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:723 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb75dd84 r8:00000002 r7:60000013 r6:eb75dd8c r5:8387c800
r4:8387c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85383d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8387c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb477000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536638c r4:85366000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536638c r4:852ffc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387c800 r8:852ffc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffc00 r8:80287e08 r7:eb749e60 r6:85363600 r5:8387c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb75dfb0 to 0xeb75dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85383c40
INFO: task kworker/1:723:5187 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b2633000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:724:5188 blocked for more than 471 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:724 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb761d84 r8:00000002 r7:60000113 r6:eb761d8c r5:8387d400
r4:8387d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853721c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8387d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb585000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85366f8c r4:85366c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85366f8c r4:852ffc80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387d400 r8:852ffcac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffc80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffc80 r8:80287e08 r7:eb75de60 r6:85363680 r5:8387d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb761fb0 to 0xeb761ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85383dc0
INFO: task kworker/1:724:5188 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b29e1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:725:5189 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:725 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb765d84 r8:00000002 r7:60000013 r6:eb765d8c r5:8387e000
r4:8387e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853838c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8387e000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4fd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536678c r4:85366400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536678c r4:84d5bf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387e000 r8:84d5bfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84d5bf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84d5bf80 r8:80287e08 r7:eb761e60 r6:85363700 r5:8387e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb765fb0 to 0xeb765ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85383dc0
INFO: task kworker/1:725:5189 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b2d2a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:726:5194 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:726 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:8387a400
r4:8387a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372240
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8387a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536738c r4:85367000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536738c r4:84fa5f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387a400 r8:84fa5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fa5f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fa5f80 r8:80287e08 r7:eb761e60 r6:85363780 r5:8387a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb76dfb0 to 0xeb76dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372180
INFO: task kworker/1:726:5194 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b3182000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:727:5195 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:727 state:D stack:0 pid:5195 tgid:5195 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb771d84 r8:00000002 r7:60000113 r6:eb771d8c r5:85503000
r4:85503000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85503000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb771e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853725c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85503000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb611000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85367b8c r4:85367800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85367b8c r4:84dfcf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85503000 r8:84dfcf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84dfcf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84dfcf00 r8:80287e08 r7:eb76de60 r6:85363800 r5:85503000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb771fb0 to 0xeb771ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372500
INFO: task kworker/1:727:5195 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b349c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:305:5197 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:305 state:D stack:0 pid:5197 tgid:5197 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb779d84 r8:00000002 r7:60000113 r6:eb779d8c r5:8387ec00
r4:8387ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530a440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8387ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eab17000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84669b8c r4:84669800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:84669b8c r4:85363880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387ec00 r8:853638ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85363880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85363880 r8:80287e08 r7:eb6c9e60 r6:85363900 r5:8387ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb779fb0 to 0xeb779ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8505fcc0
INFO: task kworker/0:305:5197 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b3948000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:728:5198 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:728 state:D stack:0 pid:5198 tgid:5198 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:8545ec00
r4:8545ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8545ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372400
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8545ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb605000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8536778c r4:85367400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8536778c r4:852fff80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8545ec00 r8:852fffac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852fff80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852fff80 r8:80287e08 r7:eb771e60 r6:85363980 r5:8545ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb77dfb0 to 0xeb77dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372500
INFO: task kworker/1:728:5198 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b40a4000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:729:5200 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:729 state:D stack:0 pid:5200 tgid:5200 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb785d84 r8:00000002 r7:60000013 r6:eb785d8c r5:85560c00
r4:85560c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85560c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb785e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85560c00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb62d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85367f8c r4:85367c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85367f8c r4:85483080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85560c00 r8:854830ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483080 r8:80287e08 r7:eb771e60 r6:85363a00 r5:85560c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb785fb0 to 0xeb785ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372780
INFO: task kworker/1:729:5200 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b47d3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:730:5202 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:730 state:D stack:0 pid:5202 tgid:5202 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:85508000
r4:85508000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85508000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853727c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85508000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb639000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552838c r4:85528000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552838c r4:85483180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85508000 r8:854831ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483180 r8:80287e08 r7:eb785e60 r6:85483200 r5:85508000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb74dfb0 to 0xeb74dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853726c0
INFO: task kworker/1:730:5202 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b4b49000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:731:5204 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:731 state:D stack:0 pid:5204 tgid:5204 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb731d84 r8:00000002 r7:60000013 r6:eb731d8c r5:85509800
r4:85509800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85509800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853729c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85509800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb64b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552878c r4:85528400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552878c r4:85483000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85509800 r8:8548302c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483000 r8:80287e08 r7:eb74de60 r6:85483100 r5:85509800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb731fb0 to 0xeb731ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853726c0
INFO: task kworker/1:731:5204 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b4ee9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:732:5206 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:732 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb78dd84 r8:00000002 r7:60000113 r6:eb78dd8c r5:8550a400
r4:8550a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372b40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb657000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85528b8c r4:85528800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85528b8c r4:85483280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550a400 r8:854832ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483280 r8:80287e08 r7:eb731e60 r6:85483400 r5:8550a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb78dfb0 to 0xeb78dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372980
INFO: task kworker/1:732:5206 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b4f9f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:733:5208 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:733 state:D stack:0 pid:5208 tgid:5208 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb791d84 r8:00000002 r7:60000013 r6:eb791d8c r5:8550b000
r4:8550b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb79d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552938c r4:85529000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552938c r4:85483300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550b000 r8:8548332c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483300 r8:80287e08 r7:eb78de60 r6:85483500 r5:8550b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb791fb0 to 0xeb791ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372b00
INFO: task kworker/1:733:5208 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b5626000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:734:5210 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:734 state:D stack:0 pid:5210 tgid:5210 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb795d84 r8:00000002 r7:60000013 r6:eb795d8c r5:8550bc00
r4:8550bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85372c80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb797000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85528f8c r4:85528c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85528f8c r4:85483380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550bc00 r8:854833ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483380 r8:80287e08 r7:eb791e60 r6:85483480 r5:8550bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb795fb0 to 0xeb795ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372bc0
INFO: task kworker/1:734:5210 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b5abe000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:735:5212 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:735 state:D stack:0 pid:5212 tgid:5212 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:8550c800
r4:8550c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8505fd80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7ab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552978c r4:85529400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552978c r4:85483600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550c800 r8:8548362c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483600 r8:80287e08 r7:eb791e60 r6:85483680 r5:8550c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a1fb0 to 0xeb7a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85372dc0
INFO: task kworker/1:735:5212 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b5d59000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:736:5215 blocked for more than 472 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:736 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7c5d84 r8:00000002 r7:60000013 r6:eb7c5d8c r5:85560000
r4:85560000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85560000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85560000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7b1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85529b8c r4:85529800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85529b8c r4:85483700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85560000 r8:8548372c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483700 r8:80287e08 r7:eb7a1e60 r6:85363a80 r5:85560000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7c5fb0 to 0xeb7c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d080
INFO: task kworker/1:736:5215 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b62ef000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:737:5216 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:737 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:85561800
r4:85561800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85561800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d4c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85561800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552a78c r4:8552a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552a78c r4:85483800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85561800 r8:8548382c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483800 r8:80287e08 r7:eb7c5e60 r6:85363b00 r5:85561800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7cdfb0 to 0xeb7cdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d2c0
INFO: task kworker/1:737:5216 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b64e9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:738:5217 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:738 state:D stack:0 pid:5217 tgid:5217 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7a9d84 r8:00000002 r7:60000013 r6:eb7a9d8c r5:8550d400
r4:8550d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d1c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85529f8c r4:85529c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85529f8c r4:85483880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550d400 r8:854838ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483880 r8:80287e08 r7:eb7cde60 r6:85483580 r5:8550d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7a9fb0 to 0xeb7a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d2c0
INFO: task kworker/1:738:5217 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b6631000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:739:5220 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:739 state:D stack:0 pid:5220 tgid:5220 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:8550e000
r4:8550e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7c9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552a38c r4:8552a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552a38c r4:85483900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550e000 r8:8548392c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483900 r8:80287e08 r7:eb7cde60 r6:85483980 r5:8550e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7bdfb0 to 0xeb7bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d340
INFO: task kworker/1:739:5220 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b67db000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:740:5221 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:740 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb789d84 r8:00000002 r7:60000013 r6:eb789d8c r5:8550ec00
r4:8550ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8550ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8550ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7e1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552ab8c r4:8552a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552ab8c r4:85483780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8550ec00 r8:854837ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483780 r8:80287e08 r7:eb7cde60 r6:85483b00 r5:8550ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb789fb0 to 0xeb789ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d340
INFO: task kworker/1:740:5221 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b69fe000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:741:5223 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:741 state:D stack:0 pid:5223 tgid:5223 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7d9d84 r8:00000002 r7:60000113 r6:eb7d9d8c r5:85508c00
r4:85508c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85508c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d7c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85508c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7ef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552af8c r4:8552ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552af8c r4:85483a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85508c00 r8:85483a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483a00 r8:80287e08 r7:eb789e60 r6:85483c00 r5:85508c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d9fb0 to 0xeb7d9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d600
INFO: task kworker/1:741:5223 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b6b44000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:742:5226 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:742 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:854fbc00
r4:854fbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:854fbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:854fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552b38c r4:8552b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552b38c r4:85483a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:854fbc00 r8:85483aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483a80 r8:80287e08 r7:eb7d9e60 r6:85483e00 r5:854fbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7edfb0 to 0xeb7edff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534d780
INFO: task kworker/1:742:5226 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b6c29000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:743:5227 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:743 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7f9d84 r8:00000002 r7:60000013 r6:eb7f9d8c r5:85510000
r4:85510000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85510000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dd80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85510000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb817000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552bf8c r4:8552bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552bf8c r4:85483d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85510000 r8:85483d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483d00 r8:80287e08 r7:eb7ede60 r6:85483d80 r5:85510000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7f9fb0 to 0xeb7f9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534da40
INFO: task kworker/1:743:5227 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7021000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:744:5230 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:744 state:D stack:0 pid:5230 tgid:5230 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb801d84 r8:00000002 r7:60000013 r6:eb801d8c r5:85510c00
r4:85510c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85510c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85510c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb803000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552b78c r4:8552b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552b78c r4:85483b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85510c00 r8:85483bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:85483b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85483b80 r8:80287e08 r7:eb7f9e60 r6:85483e80 r5:85510c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb801fb0 to 0xeb801ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534da80
INFO: task kworker/1:744:5230 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7162000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:745:5232 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:745 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000013 r6:eb80dd8c r5:85511800
r4:85511800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85511800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85511800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb809000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8552bb8c r4:8552b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8552bb8c r4:852ffe80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85511800 r8:852ffeac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:852ffe80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852ffe80 r8:80287e08 r7:eb7f9e60 r6:852fff00 r5:85511800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb80dfb0 to 0xeb80dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534db40
INFO: task kworker/1:745:5232 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b72c2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:746:5235 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:746 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb821d84 r8:00000002 r7:60000013 r6:eb821d8c r5:85512400
r4:85512400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85512400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534df00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85512400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb81d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8553038c r4:85530000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8553038c r4:855a7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85512400 r8:855a702c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7000 r8:80287e08 r7:eb7f9e60 r6:855a7080 r5:85512400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb821fb0 to 0xeb821ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534dd40
INFO: task kworker/1:746:5235 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b74ba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:747:5236 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:747 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7e5d84 r8:00000002 r7:60000013 r6:eb7e5d8c r5:85513000
r4:85513000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85513000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85513000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb82b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8553078c r4:85530400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8553078c r4:855a7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85513000 r8:855a712c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7100 r8:80287e08 r7:eb821e60 r6:855a7180 r5:85513000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7e5fb0 to 0xeb7e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534dec0
INFO: task kworker/1:747:5236 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7760000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:748:5239 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:748 state:D stack:0 pid:5239 tgid:5239 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:85513c00
r4:85513c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85513c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb831000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85530b8c r4:85530800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85530b8c r4:855a7200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85513c00 r8:855a722c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7200 r8:80287e08 r7:eb7e5e60 r6:855a7300 r5:85513c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb829fb0 to 0xeb829ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4240
INFO: task kworker/1:748:5239 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b79e3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:749:5240 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:749 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb835d84 r8:00000002 r7:60000113 r6:eb835d8c r5:85514800
r4:85514800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85514800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb835e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4480
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85514800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb845000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8553138c r4:85531000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8553138c r4:855a7380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85514800 r8:855a73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7380 r8:80287e08 r7:eb829e60 r6:855a7480 r5:85514800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb835fb0 to 0xeb835ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a43c0
INFO: task kworker/1:749:5240 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7c8f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:750:5242 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:750 state:D stack:0 pid:5242 tgid:5242 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb83dd84 r8:00000002 r7:60000013 r6:eb83dd8c r5:85515400
r4:85515400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85515400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a42c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85515400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb83f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85530f8c r4:85530c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85530f8c r4:855a7280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85515400 r8:855a72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7280 r8:80287e08 r7:eb835e60 r6:855a7580 r5:85515400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb83dfb0 to 0xeb83dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4280
INFO: task kworker/1:750:5242 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7da3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:751:5244 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:751 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:85516000
r4:85516000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85516000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85516000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb859000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85531b8c r4:85531800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85531b8c r4:855a7400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85516000 r8:855a742c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7400 r8:80287e08 r7:eb835e60 r6:855a7680 r5:85516000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb849fb0 to 0xeb849ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a46c0
INFO: task kworker/1:751:5244 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b7da3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:752:5246 blocked for more than 473 seconds.
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb851d84 r8:00000002 r7:60000013 r6:eb851d8c r5:85516c00
r4:85516c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85516c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a45c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85516c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb853000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8553178c r4:85531400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8553178c r4:855a7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85516c00 r8:855a752c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7500 r8:80287e08 r7:eb849e60 r6:855a7780 r5:85516c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb851fb0 to 0xeb851ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4500
INFO: task kworker/1:752:5246 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b8385000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:85518000 r4:8291a680
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:85531f8c r4:85531c00
r7:ddde2d80 r6:83018200 r5:85531f8c r4:855a7600
r10:00000000 r9:855a7600 r8:80287e08 r7:eb849e60 r6:855a7700 r5:85518000
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4740
INFO: task kworker/1:753:5248 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b8385000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
r4:85518c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8553278c r4:85532400
r7:ddde2d80 r6:83018200 r5:8553278c r4:855a7800
r10:00000000 r9:855a7800 r8:80287e08 r7:eb85de60 r6:855a7900 r5:85518c00
r4:855a4940
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b874f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:755:5252 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:755 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb871d84 r8:00000002 r7:60000013 r6:eb871d8c r5:85519800
r4:85519800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85519800 r4:8291a680
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:8553238c r4:85532000
r10:61c88647 r9:85519800 r8:855a79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb871fb0 to 0xeb871ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4a40
INFO: task kworker/1:755:5252 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:00000000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8551a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0683000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:84669f8c r4:84669c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:84669f8c r4:855a7b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8551a400 r8:855a7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7b80 r8:80287e08 r7:eb865e60 r6:855a7a00 r5:8551a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb879fb0 to 0xeb879ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4a40
INFO: task kworker/1:756:5257 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
r5:80070013 r4:80239bb0
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
r5:8551b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8551b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb153000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ce78c r4:854ce400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:854ce78c r4:855a7a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8551b000 r8:855a7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7a80 r8:80287e08 r7:eb879e60 r6:855a7b00 r5:8551b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb6d5fb0 to 0xeb6d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4a40
INFO: task kworker/1:757:5258 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b8ebd000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb885d84 r8:00000002 r7:60000113 r6:eb885d8c r5:8551bc00
r4:8551bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8551bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc7c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8551bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb117000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85532b8c r4:85532800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85532b8c r4:855a7c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8551bc00 r8:855a7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855a7c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855a7c00 r8:80287e08 r7:eb6d5e60 r6:855a7c80 r5:8551bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb885fb0 to 0xeb885ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4a40
INFO: task kworker/1:758:5259 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b8ebd000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ccb8c r4:854cc800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854ccb8c r4:85363c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8551c800 r8:85363c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85363c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85363c00 r8:80287e08 r7:eb6c9e60 r6:855a7d00 r5:8551c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb889fb0 to 0xeb889ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c2100
INFO: task kworker/0:306:5261 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b90da000 dfeb5000 00000001 80239b98 7f081000 00000001
r5:00001000 r4:dfa13000
r4:00000001
INFO: task kworker/0:307:5262 blocked for more than 473 seconds.
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r10:61c88647 r9:8551d400 r8:85363dac r7:82804d40 r6:dddced80 r5:dddceda0
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:308:5265 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:308 state:D stack:0 pid:5265 tgid:5265 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:84ee0000 r4:8291a680
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2480
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ccf8c r4:854ccc00
r7:dddced80 r6:83018000 r5:854ccf8c r4:85363e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
r5:00001000 r4:dfa13000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fa0: 00000000 00000000 00000000 00000000
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
Workqueue: events bpf_prog_free_deferred
r4:84ee1800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cd78c r4:854cd400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:85363e80 r8:80287e08 r7:eb899e60 r6:855a7e80 r5:84ee1800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:855c2440
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d20: b972e000 dfeb5000 00000001 80239b98 7f081000 00000001
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:00001000 r4:dfa13000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:310:5268 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:310 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:84ee2400
r4:84ee2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ee2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2640
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ee2400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb015000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cd38c r4:854cd000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cd38c r4:85363c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ee2400 r8:85363cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85363c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85363c80 r8:80287e08 r7:eb8a1e60 r6:855a7f00 r5:84ee2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8a5fb0 to 0xeb8a5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c2440
INFO: task kworker/0:310:5268 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b9870000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:311:5270 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:311 state:D stack:0 pid:5270 tgid:5270 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8add84 r8:00000002 r7:60000113 r6:eb8add8c r5:84ee3c00
r4:84ee3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ee3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ee3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cdf8c r4:854cdc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cdf8c r4:85363f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ee3c00 r8:85363fac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85363f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85363f80 r8:80287e08 r7:eb8a1e60 r6:855a7f80 r5:84ee3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8adfb0 to 0xeb8adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c2540
INFO: task kworker/0:311:5270 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b9a57000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:312:5272 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:312 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb881d84 r8:00000002 r7:60000113 r6:eb881d8c r5:85562400
r4:85562400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85562400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85562400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb087000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cdb8c r4:854cd800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cdb8c r4:855b7000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85562400 r8:855b702c r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7000 r8:80287e08 r7:eb8ade60 r6:855b7080 r5:85562400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb881fb0 to 0xeb881ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c26c0
INFO: task kworker/0:312:5272 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: b9dc1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:313:5275 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:313 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:85564800
r4:85564800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85564800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c2b80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85564800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0f3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854ce38c r4:854ce000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854ce38c r4:855b7100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85564800 r8:855b712c r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7100 r8:80287e08 r7:eb8ade60 r6:855b7280 r5:85564800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8b5fb0 to 0xeb8b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c28c0
INFO: task kworker/0:313:5275 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ba3fb000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:314:5277 blocked for more than 473 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:314 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8b9d84 r8:00000002 r7:60000013 r6:eb8b9d8c r5:85563000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85563000 r8:855b71ac r7:82804d40 r6:dddced80 r5:dddceda0
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r5:00001000 r4:dfa13000
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r5:854cf78c r4:854cf400
r10:61c88647 r9:85565400 r8:855b722c r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Call trace:
1d20: ba849000 dfeb5000 00000001 80239b98 7f081000 00000001
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:759:5280 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:759 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8c5d84 r8:00000002 r7:60000113 r6:eb8c5d8c r5:85563c00
r4:85563c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85563c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fc80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85563c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaff5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85533b8c r4:85533800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85533b8c r4:855b1000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85563c00 r8:855b102c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1000 r8:80287e08 r7:eb6d5e60 r6:855b7300 r5:85563c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8c5fb0 to 0xeb8c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bc780
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:00000000
r5:85ef9f8c r4:85ef9c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r4:85566c00
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced80 r6:83018000 r5:854cef8c r4:855b7400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bb054000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:317:5286 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:317 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:8544e000
r4:8544e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8544e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8544e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2f7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cf38c r4:854cf000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cf38c r4:855b7500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8544e000 r8:855b752c r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7500 r8:80287e08 r7:eb8bde60 r6:855b7580 r5:8544e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8c1fb0 to 0xeb8c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bb400
INFO: task kworker/0:317:5286 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bb2f0000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:318:5289 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:318 state:D stack:0 pid:5289 tgid:5289 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb891d84 r8:00000002 r7:60000113 r6:eb891d8c r5:85566000
r4:85566000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85566000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb6c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85566000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3bf000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cfb8c r4:854cf800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cfb8c r4:855b7680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85566000 r8:855b76ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7680 r8:80287e08 r7:eb8bde60 r6:855b7800 r5:85566000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb891fb0 to 0xeb891ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bb500
INFO: task kworker/0:318:5289 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bb647000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:319:5290 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:319 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:8387bc00
r4:8387bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8387bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb680
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8387bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4a5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854cff8c r4:854cfc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854cff8c r4:855b7700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8387bc00 r8:855b772c r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7700 r8:80287e08 r7:eb891e60 r6:855b7780 r5:8387bc00
r4:00000001
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:855bb500
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:320:5293 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:320 state:D stack:0 pid:5293 tgid:5293 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8ddd84 r8:00000002 r7:60000113 r6:eb8ddd8c r5:84ee6000
r4:84ee6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ee6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bb940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ee6000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4c1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d438c r4:854d4000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d438c r4:855b7880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ee6000 r8:855b78ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7880 r8:80287e08 r7:eb8cde60 r6:855b1080 r5:84ee6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8ddfb0 to 0xeb8ddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bb8c0
INFO: task kworker/0:320:5293 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bb647000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:321:5294 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:321 state:D stack:0 pid:5294 tgid:5294 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:84ee5400
r4:84ee5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ee5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbb40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ee5400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb4dd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d478c r4:854d4400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d478c r4:855b7980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ee5400 r8:855b79ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7980 r8:80287e08 r7:eb8dde60 r6:855b1100 r5:84ee5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e1fb0 to 0xeb8e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bb980
INFO: task kworker/0:321:5294 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bba7c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:854d4f8c r4:854d4c00
r4:855b7900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7900 r8:80287e08 r7:eb8e1e60 r6:855b1180 r5:84ee0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8e9fb0 to 0xeb8e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bbb00
INFO: task kworker/0:322:5296 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bbc9b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:323:5297 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:323 state:D stack:0 pid:5297 tgid:5297 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8edd84 r8:00000002 r7:60000113 r6:eb8edd8c r5:84ee6c00
r4:84ee6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ee6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbbc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84ee6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d4b8c r4:854d4800
r10:61c88647 r9:84ee6c00 r8:855b7aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:00000001
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:760:5299 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:760 state:D stack:0 pid:5299 tgid:5299 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb8f1d84 r8:00000002 r7:60000113 r6:eb8f1d8c r5:84ee4800
r4:84ee4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84ee4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fa00
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:855b1280
Exception stack(0xeb8f1fb0 to 0xeb8f1ff8)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:84d87ac0
Workqueue: events bpf_prog_free_deferred
r10:8291a684 r9:eb8f5d84 r8:00000002 r7:60000013 r6:eb8f5d8c r5:84ee3000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d6b8c r4:854d6800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d6b8c r4:855b7a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84ee3000 r8:855b7a2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7a00 r8:80287e08 r7:eb8e9e60 r6:855b1380 r5:84ee3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8f5fb0 to 0xeb8f5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bbf00
INFO: task kworker/0:324:5300 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bc271000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d538c r4:854d5000
r10:61c88647 r9:8551e000 r8:855b7bac r7:82804d40 r6:dddced80 r5:dddceda0
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
1fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85520c00 r8:855b7c2c r7:82804d40 r6:dddced80 r5:dddceda0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:327:5306 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:327 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb911d84 r8:00000002 r7:60000013 r6:eb911d8c r5:85522400
r4:85522400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85522400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb911e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa1c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85522400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb913000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d5b8c r4:854d5800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d5b8c r4:855b7c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85522400 r8:855b7cac r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7c80 r8:80287e08 r7:eb8f5e60 r6:855b1500 r5:85522400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb911fb0 to 0xeb911ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855aa000
INFO: task kworker/0:327:5306 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bcb4e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:328:5308 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:328 state:D stack:0 pid:5308 tgid:5308 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb925d84 r8:00000002 r7:60000113 r6:eb925d8c r5:85521800
r4:85521800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85521800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb925e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85521800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb919000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d5f8c r4:854d5c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d5f8c r4:855b7d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Exception stack(0xdffe1d28 to 0xdffe1d70)
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:329:5310 blocked for more than 474 seconds.
r5:85520000 r4:8291a680
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa3c0
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r5:80070013 r4:80239bb0
r4:dffe1dc0
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
1fa0: 00000000 00000000 00000000 00000000
task:kworker/0:330 state:D stack:0 pid:5312 tgid:5312 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa580
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85523000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb935000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d678c r4:854d6400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d678c r4:855b7e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85523000 r8:855b7eac r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7e80 r8:80287e08 r7:eb8f5e60 r6:855b1680 r5:85523000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb93dfb0 to 0xeb93dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855aa400
INFO: task kworker/0:330:5312 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bdc57000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:331:5314 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:331 state:D stack:0 pid:5314 tgid:5314 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
r10:8291a684 r9:eb951d84 r8:00000002 r7:60000113 r6:eb951d8c r5:85523c00
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85523c00 r8:855b7f2c r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:332:5316 blocked for more than 474 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:332 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb95dd84 r8:00000002 r7:60000013 r6:eb95dd8c r5:85524800
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:854d6f8c r4:854d6c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:854d6f8c r4:855b7f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85524800 r8:855b7fac r7:82804d40 r6:dddced80 r5:dddceda0
r4:855b7f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b7f80 r8:80287e08 r7:eb951e60 r6:855b1780 r5:85524800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb95dfb0 to 0xeb95dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855aa6c0
INFO: task kworker/0:332:5316 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bef99000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
INFO: task kworker/0:333:5318 blocked for more than 474 seconds.
r4:85525400
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aa980
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:85525400 r8:855b7b2c r7:82804d40 r6:dddced80 r5:dddceda0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:855aa8c0
INFO: task kworker/0:333:5318 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: bf3d6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r5:00001000 r4:dfa7d000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Call trace:
Exception stack(0xdffe1d28 to 0xdffe1d70)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370540
r5:00001000 r4:eb8a9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8564438c r4:85644000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8564438c r4:85363d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85579800 r8:85363d2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85363d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85363d00 r8:80287e08 r7:eb951e60 r6:85363f00 r5:85579800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb8d5fb0 to 0xeb8d5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855aaa40
INFO: task kworker/0:335:5324 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c007e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:336:5325 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:336 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:8557a400
r4:8557a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:852f7000
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
1d20: c0392000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r4:00000001
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:761:5328 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:761 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb975d84 r8:00000002 r7:60000013 r6:eb975d8c r5:8557bc00
r4:8557bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8557bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fac0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8557bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eadeb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8553378c r4:85533400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8553378c r4:855b1980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8557bc00 r8:855b19ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1980 r8:80287e08 r7:eb8c5e60 r6:852f7100 r5:8557bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb975fb0 to 0xeb975ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534fb00
INFO: task kworker/1:761:5328 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c0392000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:762:5330 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:762 state:D stack:0 pid:5330 tgid:5330 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:8557c800
r4:8557c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8557c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534f340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8557c800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb269000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85548b8c r4:85548800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85548b8c r4:855b1b00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8557c800 r8:855b1b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1b00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1b00 r8:80287e08 r7:eb8c5e60 r6:852f7180 r5:8557c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb979fb0 to 0xeb979ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534fbc0
INFO: task kworker/1:762:5330 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c087f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:763:5331 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:763 state:D stack:0 pid:5331 tgid:5331 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:8557d400
r4:8557d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8557d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fe00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8557d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1d1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85533f8c r4:85533c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85533f8c r4:855b1c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8557d400 r8:855b1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1c00 r8:80287e08 r7:eb979e60 r6:852f7200 r5:8557d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb97dfb0 to 0xeb97dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534fbc0
INFO: task kworker/1:763:5331 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c0d5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:764:5334 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:764 state:D stack:0 pid:5334 tgid:5334 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb981d84 r8:00000002 r7:60000113 r6:eb981d8c r5:8557e000
r4:8557e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8557e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534fe80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8557e000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb1f5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554838c r4:85548000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554838c r4:855b1b80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8557e000 r8:855b1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1b80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1b80 r8:80287e08 r7:eb979e60 r6:852f7280 r5:8557e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb981fb0 to 0xeb981ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534fd80
INFO: task kworker/1:764:5334 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c0fc8000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:765:5336 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:765 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb989d84 r8:00000002 r7:60000113 r6:eb989d8c r5:8557b000
r4:8557b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8557b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb989e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534f800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8557b000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb22f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554878c r4:85548400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554878c r4:855b1c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8557b000 r8:855b1cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1c80 r8:80287e08 r7:eb979e60 r6:852f7300 r5:8557b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb989fb0 to 0xeb989ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534ff80
INFO: task kworker/1:765:5336 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c1085000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:766:5338 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:766 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb991d84 r8:00000002 r7:60000113 r6:eb991d8c r5:84248000
r4:84248000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84248000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534f780
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84248000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb2a7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85548f8c r4:85548c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85548f8c r4:855b1d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84248000 r8:855b1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1d80 r8:80287e08 r7:eb979e60 r6:852f7380 r5:84248000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb991fb0 to 0xeb991ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534f480
INFO: task kworker/1:766:5338 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c1be2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:767:5339 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:767 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:84248c00
r4:84248c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84248c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bbf40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84248c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554938c r4:85549000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554938c r4:855b1e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84248c00 r8:855b1e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1e00 r8:80287e08 r7:eb991e60 r6:852f7400 r5:84248c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb995fb0 to 0xeb995ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534f480
INFO: task kworker/1:767:5339 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c1be2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:768:5341 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:768 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:8424a400
r4:8424a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8424a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855983c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8424a400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb5bb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554a78c r4:8554a400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554a78c r4:855b1d00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8424a400 r8:855b1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1d00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1d00 r8:80287e08 r7:eb995e60 r6:852f7480 r5:8424a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb99dfb0 to 0xeb99dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8534f7c0
INFO: task kworker/1:768:5341 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c1e90000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:769:5344 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:769 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9a9d84 r8:00000002 r7:60000013 r6:eb9a9d8c r5:84249800
r4:84249800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84249800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bc880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84249800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb425000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554978c r4:85549400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554978c r4:855b1f00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84249800 r8:855b1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1f00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1f00 r8:80287e08 r7:eb99de60 r6:852f7500 r5:84249800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9a9fb0 to 0xeb9a9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bcf00
INFO: task kworker/1:769:5344 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c28e9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:770:5345 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:770 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:85526c00
r4:85526c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85526c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a4a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85526c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb441000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85549b8c r4:85549800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85549b8c r4:855b1e80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85526c00 r8:855b1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1e80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1e80 r8:80287e08 r7:eb99de60 r6:855b1880 r5:85526c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb7d1fb0 to 0xeb7d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855a4a00
INFO: task kworker/1:770:5345 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c28e9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:771:5348 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:771 state:D stack:0 pid:5348 tgid:5348 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9add84 r8:00000002 r7:60000113 r6:eb9add8c r5:85526000
r4:85526000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85526000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85526000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb479000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85549f8c r4:85549c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85549f8c r4:855b1f80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85526000 r8:855b1fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1f80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1f80 r8:80287e08 r7:eb99de60 r6:855b1900 r5:85526000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9adfb0 to 0xeb9adff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85598100
INFO: task kworker/1:771:5348 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c2c51000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:772:5350 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:772 state:D stack:0 pid:5350 tgid:5350 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb971d84 r8:00000002 r7:60000113 r6:eb971d8c r5:855d0000
r4:855d0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855d0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:8554a38c r4:8554a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:855d0000 r8:85483cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb971fb0 to 0xeb971ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85598180
INFO: task kworker/1:772:5350 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c35e2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:773:5352 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:773 state:D stack:0 pid:5352 tgid:5352 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9b1d84 r8:00000002 r7:60000013 r6:eb9b1d8c r5:855d1800
r4:855d1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855d1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855987c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb619000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554af8c r4:8554ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554af8c r4:8559c000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855d1800 r8:8559c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r10:00000000 r9:8559c000 r8:80287e08 r7:eb99de60 r6:8559c180 r5:855d1800
r4:85598380
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:855d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
r5:8554ab8c r4:8554a800
r10:61c88647 r9:855d0c00 r8:8559c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:85598280
INFO: task kworker/1:774:5354 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c35e2000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:775:5356 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:775 state:D stack:0 pid:5356 tgid:5356 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9bdd84 r8:00000002 r7:60000013 r6:eb9bdd8c r5:8424b000
r4:8424b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8424b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9bde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598900
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8424b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb637000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554b38c r4:8554b000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554b38c r4:8559c300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8424b000 r8:8559c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c300 r8:80287e08 r7:eb9b1e60 r6:852f7580 r5:8424b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9bdfb0 to 0xeb9bdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855989c0
INFO: task kworker/1:775:5356 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c3a6a000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:776:5358 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:776 state:D stack:0 pid:5358 tgid:5358 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9c1d84 r8:00000002 r7:60000013 r6:eb9c1d8c r5:8424bc00
r4:8424bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8424bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8424bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb64d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554b78c r4:8554b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554b78c r4:8559c200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8424bc00 r8:8559c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c200 r8:80287e08 r7:eb9bde60 r6:852f7600 r5:8424bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c1fb0 to 0xeb9c1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
r4:85598840
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:777:5360 blocked for more than 475 seconds.
r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:8424e000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
r5:00001000 r4:eb717000
r5:8554bf8c r4:8554bc00
r10:61c88647 r9:8424e000 r8:8559c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb9c9fb0 to 0xeb9c9ff8)
r4:85598a40
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:778:5362 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:778 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9d1d84 r8:00000002 r7:60000113 r6:eb9d1d8c r5:8424c800
r4:8424c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8424c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598b00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8424c800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb661000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8554bb8c r4:8554b800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8554bb8c r4:8559c480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8424c800 r8:8559c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c480 r8:80287e08 r7:eb9c9e60 r6:852f7700 r5:8424c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9d1fb0 to 0xeb9d1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85598c80
INFO: task kworker/1:778:5362 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c464c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/1:779:5364 blocked for more than 475 seconds.
Call trace:
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:85550f8c r4:85550c00
r10:61c88647 r9:85578000 r8:8559c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:780:5366 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:780 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9ddd84 r8:00000002 r7:60000013 r6:eb9ddd8c r5:8557ec00
r4:8557ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8557ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9dde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85598e00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8557ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb725000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8555038c r4:85550000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555038c r4:8559c280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8557ec00 r8:8559c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c280 r8:80287e08 r7:eb9d9e60 r6:852f7800 r5:8557ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c4ad6000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:781:5367 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:781 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9e1d84 r8:00000002 r7:60000013 r6:eb9e1d8c r5:8424d400
r4:8424d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8424d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8424d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8555078c r4:85550400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:8424d400 r8:8559c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:dffe1dc0
r4:00000000
r5:85ef9f8c r4:85ef9c00
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
task:kworker/1:782 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a280
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8424ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb767000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85550b8c r4:85550800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85550b8c r4:8559c680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8424ec00 r8:8559c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c680 r8:80287e08 r7:eb9d9e60 r6:852f7900 r5:8424ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9b5fb0 to 0xeb9b5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8559a240
INFO: task kworker/1:782:5370 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
Not tainted 6.15.0-rc6-syzkaller #0
r4:84e20c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84e20c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
r5:8555138c r4:85551000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8559c700
Exception stack(0xeb861fb0 to 0xeb861ff8)
r4:8559a340
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:784:5375 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:784 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb895d84 r8:00000002 r7:60000113 r6:eb895d8c r5:84e20000
r4:84e20000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e20000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559a5c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e20000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e891f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8555178c r4:85551400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555178c r4:8559c600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e20000 r8:8559c62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c600 r8:80287e08 r7:eb861e60 r6:852f7980 r5:84e20000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb895fb0 to 0xeb895ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8559a440
INFO: task kworker/1:784:5375 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:85ef9f8c r4:85ef9c00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:785:5377 blocked for more than 475 seconds.
r10:8291a684 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:84e23000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:85551b8c r4:8559c780
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:786:5379 blocked for more than 475 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:786 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb91dd84 r8:00000002 r7:60000013 r6:eb91dd8c r5:84e23c00
r4:84e23c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e23c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ab00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb031000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8555278c r4:85552400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555278c r4:8559c880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e23c00 r8:8559c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c880 r8:80287e08 r7:eb901e60 r6:852f7b00 r5:84e23c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb91dfb0 to 0xeb91dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8559a500
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85551f8c r4:85551c00
r10:61c88647 r9:84e22400 r8:8559c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d20: c5bcc000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r5:00001000 r4:dfa13000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
r4:84d87ac0
Not tainted 6.15.0-rc6-syzkaller #0
r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:855d3000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8555238c r4:85552000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555238c r4:8559c980
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855d3000 r8:8559c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c980
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c980 r8:80287e08 r7:eb91de60 r6:8559ca00 r5:855d3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9c5fb0 to 0xeb9c5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8559a800
INFO: task kworker/1:788:5382 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c5f26000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:789:5385 blocked for more than 476 seconds.
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559acc0
r5:85552b8c r4:85552800
r10:61c88647 r9:855d4800 r8:8559c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeb941fb0 to 0xeb941ff8)
r4:8559ac00
Workqueue: events bpf_prog_free_deferred
1d20: c6340000 dfeb5000 00000001 80239b98 7f081000 00000001
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:790:5388 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:790 state:D stack:0 pid:5388 tgid:5388 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb945d84 r8:00000002 r7:60000013 r6:eb945d8c r5:855d5400
r4:855d5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855d5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559ad40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb0db000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85552f8c r4:85552c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85552f8c r4:8559c800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855d5400 r8:8559c82c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559c800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559c800 r8:80287e08 r7:eb941e60 r6:8559cb80 r5:855d5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb945fb0 to 0xeb945ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8559ac80
INFO: task kworker/1:790:5388 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c6da7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:791:5389 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:791 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb815d84 r8:00000002 r7:60000013 r6:eb815d8c r5:855d6000
r4:855d6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855d6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8555338c r4:85553000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555338c r4:8559cc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855d6000 r8:8559cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559cc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559cc00 r8:80287e08 r7:eb945e60 r6:8559ca80 r5:855d6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb815fb0 to 0xeb815ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8559ac80
INFO: task kworker/1:791:5389 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c6da7000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:855d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000
r5:8555378c r4:85553400
r10:61c88647 r9:855d3c00 r8:8559ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559ad80
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:82ac21e4
r4:00000000
r5:00001000 r4:dfa13000
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:793:5392 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:793 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:855d2400
r4:855d2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855d2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb327000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85553f8c r4:85553c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85553f8c r4:8559ce00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855d2400 r8:8559ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8559ce00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8559ce00 r8:80287e08 r7:eb969e60 r6:8559cd00 r5:855d2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9e9fb0 to 0xeb9e9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8555e400
INFO: task kworker/1:793:5392 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c7203000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
r5:855d8000 r4:8291a680
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
r5:00001000 r4:eb2e5000
r5:85553b8c r4:85553800
r10:61c88647 r9:855d8000 r8:85483fac r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:795:5398 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:795 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eb9f9d84 r8:00000002 r7:60000113 r6:eb9f9d8c r5:84e26000
r4:84e26000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e26000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf180
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e26000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000
r5:00001000 r4:eb497000
r5:8555438c r4:85554000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:8559cf80
9fa0: 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:dffe1dc0
r4:00000000
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
r5:00001000 r4:eb4bf000
r5:8555478c r4:85554400
r10:61c88647 r9:84e26c00 r8:855c802c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c7cdc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85555f8c r4:85555c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85555f8c r4:855c8080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e21800 r8:855c80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8080 r8:80287e08 r7:eb9fde60 r6:852f7d00 r5:84e21800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba05fb0 to 0xeba05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bf2c0
INFO: task kworker/1:797:5401 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c7cdc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:8551ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000
r5:85554b8c r4:85554800
r10:61c88647 r9:8551ec00 r8:855c812c r7:82804d40 r6:ddde2d80 r5:ddde2da0
Exception stack(0xeba09fb0 to 0xeba09ff8)
Workqueue: events bpf_prog_free_deferred
r4:00000000
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r4:dffe1dc0
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:799:5404 blocked for more than 476 seconds.
r4:855d8c00
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb669000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85554f8c r4:85554c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85554f8c r4:855c8180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855d8c00 r8:855c81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8180 r8:80287e08 r7:eba05e60 r6:855c8280 r5:855d8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9e5fb0 to 0xeb9e5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bf440
INFO: task kworker/1:799:5404 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c8891000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:800:5406 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:8555538c r4:855c8300
r4:855c8300
1fa0: 00000000 00000000 00000000 00000000
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:dffe1dc0
r4:00000000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855aef80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84dd0000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7c7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8466af8c r4:8466ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8466af8c r4:852f7e00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84dd0000 r8:852f7e2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:852f7e00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:852f7e00 r8:80287e08 r7:eb8d5e60 r6:852f7f80 r5:84dd0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9f1fb0 to 0xeb9f1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855aec40
INFO: task kworker/0:337:5409 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c8c11000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
r5:84dd1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bf980
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84dd1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:8555578c r4:85555400
r7:ddde2d80 r6:83018200 r5:8555578c r4:855c8200
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c8c11000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:84d87ac0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfb00
r9:83018205 r8:84dd2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85555b8c r4:85555800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85555b8c r4:855c8500
r10:61c88647 r9:84dd2400 r8:855c852c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8500
r4:00000001
Exception stack(0xeba1dfb0 to 0xeba1dff8)
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
1d20: c8daf000 dfeb5000 00000001 80239b98 7f081000 00000001
r4:82ac21e4
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:00000000
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:803:5416 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:803 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba25d84 r8:00000002 r7:60000113 r6:eba25d8c r5:84dd3c00
r4:84dd3c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84dd3c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfd80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84dd3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7e9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8555638c r4:85556000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555638c r4:855c8580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84dd3c00 r8:855c85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8580 r8:80287e08 r7:eba05e60 r6:85384000 r5:84dd3c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba25fb0 to 0xeba25ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bfb80
INFO: task kworker/1:803:5416 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c911b000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:804:5419 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:804 state:D stack:0 pid:5419 tgid:5419 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba31d84 r8:00000002 r7:60000013 r6:eba31d8c r5:84dd3000
r4:84dd3000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84dd3000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba31e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855bfe80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84dd3000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7fb000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8555678c r4:85556400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555678c r4:855c8480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84dd3000 r8:855c84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8480 r8:80287e08 r7:eba25e60 r6:85384180 r5:84dd3000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba31fb0 to 0xeba31ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bfdc0
INFO: task kworker/1:804:5419 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c958f000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:805:5420 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:805 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:84dd4800
r4:84dd4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84dd4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5380
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84dd4800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb82f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8555738c r4:85557000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8555738c r4:855c8680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84dd4800 r8:855c86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8680 r8:80287e08 r7:eba31e60 r6:85384080 r5:84dd4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba35fb0 to 0xeba35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bfec0
INFO: task kworker/1:805:5420 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c961c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r4:84e0be80
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
INFO: task kworker/0:338:5421 blocked for more than 476 seconds.
r10:8291a684 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:84dd6000
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8564478c r4:85644400
r10:61c88647 r9:84dd6000 r8:8538412c r7:82804d40 r6:dddced80 r5:dddceda0
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855ae440
INFO: task kworker/0:338:5421 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: c9819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:84dd6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000
r5:85556b8c r4:85556800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r4:00000001
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
r4:84d87ac0
task:kworker/1:807 state:D stack:0 pid:5423 tgid:5423 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5240
r5:85556f8c r4:85556c00
r7:ddde2d80 r6:83018200 r5:85556f8c r4:855c8780
r4:00000001
r4:855c50c0
Workqueue: events bpf_prog_free_deferred
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:808:5427 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:808 state:D stack:0 pid:5427 tgid:5427 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba45d84 r8:00000002 r7:60000013 r6:eba45d8c r5:84dd0c00
r4:84dd0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84dd0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5400
r5:8555778c r4:85557400
r7:ddde2d80 r6:83018200 r5:8555778c r4:855c8380
5fa0: 00000000 00000000 00000000 00000000
r4:00000000
r4:82ac21e4
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
task:kworker/1:809 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85588000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb84d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85557b8c r4:85557800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85557b8c r4:855c8800
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85588000 r8:855c882c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8800
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8800 r8:80287e08 r7:eba45e60 r6:85384400 r5:85588000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba51fb0 to 0xeba51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c5100
INFO: task kworker/1:809:5430 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ca212000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
Not tainted 6.15.0-rc6-syzkaller #0
Call trace:
r5:855db000 r4:8291a680
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:855db000 r8:855c872c r7:82804d40 r6:ddde2d80 r5:ddde2da0
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r5:85ef9f8c r4:85ef9c00
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
Not tainted 6.15.0-rc6-syzkaller #0
r10:8291a684 r9:eba4dd84 r8:00000002 r7:60000013 r6:eba4dd8c r5:855da400
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8560838c r4:85608000
r7:ddde2d80 r6:83018200 r5:8560838c r4:855c8900
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
1d20: ca668000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:812:5435 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:812 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba55d84 r8:00000002 r7:60000013 r6:eba55d8c r5:855dc800
r4:855dc800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855dc800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba55e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c5c40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb8f9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560878c r4:85608400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560878c r4:855c8880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855dc800 r8:855c88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8880 r8:80287e08 r7:eba4de60 r6:855c8a00 r5:855dc800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba55fb0 to 0xeba55ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c5780
INFO: task kworker/1:812:5435 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
Exception stack(0xdffe1d28 to 0xdffe1d70)
r4:82ac21e4
r4:00000000
r5:85ef9f8c r4:85ef9c00
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/0:339:5438 blocked for more than 476 seconds.
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:85384480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85384480 r8:80287e08 r7:eba39e60 r6:855c8b00 r5:855dec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba61fb0 to 0xeba61ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85370600
INFO: task kworker/0:339:5438 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ca92e000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
INFO: task kworker/1:813:5440 blocked for more than 476 seconds.
r10:8291a684 r9:eba5dd84 r8:00000002 r7:60000013 r6:eba5dd8c r5:855dd400
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:85608b8c r4:85608800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r10:00000000 r9:855c8b80 r8:80287e08 r7:eba55e60 r6:855c8d00 r5:855dd400
r4:855c5c00
Workqueue: events bpf_prog_free_deferred
1d20: cacff000 dfeb5000 00000001 80239b98 7f081000 00000001
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:855de000 r7:00000000 r6:83018200 r5:00001000 r4:7f00f000
r5:85608f8c r4:85608c00
r4:855c8c00
r4:00000001
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:82ac21e4
r4:00000000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:815:5444 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:815 state:D stack:0 pid:5444 tgid:5444 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba15d84 r8:00000002 r7:60000013 r6:eba15d8c r5:855dbc00
r4:855dbc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855dbc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855c59c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ea981000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560938c r4:85609000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560938c r4:855c8c80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855dbc00 r8:855c8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8c80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8c80 r8:80287e08 r7:eba59e60 r6:855c8e80 r5:855dbc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba15fb0 to 0xeba15ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855c5ec0
INFO: task kworker/1:815:5444 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cb053000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r4:00000001
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
Call trace:
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r9:83018205 r8:855d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000
r5:8560978c r4:85609400
r4:8559cf00
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
r4:855bfec0
INFO: task kworker/1:816:5446 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cb053000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:8291a684 r9:eb9a1d84 r8:00000002 r7:60000013 r6:eb9a1d8c r5:855e0000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560a38c r4:8560a000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560a38c r4:855c8d80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e0000 r8:855c8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855c8d80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855c8d80 r8:80287e08 r7:eb985e60 r6:855c8f80 r5:855e0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeb9a1fb0 to 0xeb9a1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:855bfec0
INFO: task kworker/1:817:5448 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cb464000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:818 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r7:ddde2d80 r6:83018200 r5:85609b8c r4:84fab080
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cb464000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:819:5452 blocked for more than 476 seconds.
Workqueue: events bpf_prog_free_deferred
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85609f8c r4:85609c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85609f8c r4:84fab100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e0c00 r8:84fab12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab100 r8:80287e08 r7:eb9a1e60 r6:84fab280 r5:855e0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba6dfb0 to 0xeba6dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f80240
INFO: task kworker/1:819:5452 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r4:00000000
1d60: 80230ad0 80239bb0 80070013 ffffffff
r4:dffe1dc0
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
task:kworker/1:820 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000
r4:00000000
r4:00000000
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r10:61c88647 r9:855e3000 r8:84fab1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
1d60: 80230ad0 80239bb0 80070013 ffffffff
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
INFO: task kworker/1:821:5457 blocked for more than 476 seconds.
r10:8291a684 r9:eba71d84 r8:00000002 r7:60000113 r6:eba71d8c r5:855e3c00
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r5:8560b38c r4:8560b000
r7:ddde2d80 r6:83018200 r5:8560b38c r4:84fab200
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Workqueue: events bpf_prog_free_deferred
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cb9dc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:822:5458 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:822 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba75d84 r8:00000002 r7:60000113 r6:eba75d8c r5:855e4800
r4:855e4800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e4800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb3cd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560ab8c r4:8560a800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560ab8c r4:84fab480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e4800 r8:84fab4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab480 r8:80287e08 r7:eba71e60 r6:84fab300 r5:855e4800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba75fb0 to 0xeba75ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f80780
INFO: task kworker/1:822:5458 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cbd86000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:823:5461 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:823 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:855e5400
r4:855e5400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e5400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80a00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb42f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560af8c r4:8560ac00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560af8c r4:84fab500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e5400 r8:84fab52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab500 r8:80287e08 r7:eba71e60 r6:84fab600 r5:855e5400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba79fb0 to 0xeba79ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f809c0
INFO: task kworker/1:823:5461 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc051000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:824:5462 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:824 state:D stack:0 pid:5462 tgid:5462 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba7dd84 r8:00000002 r7:60000113 r6:eba7dd8c r5:855e6000
r4:855e6000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e6000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba7de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f80d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb521000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560b78c r4:8560b400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560b78c r4:84fab680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e6000 r8:84fab6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab680 r8:80287e08 r7:eba71e60 r6:84fab580 r5:855e6000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba7dfb0 to 0xeba7dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f80a80
INFO: task kworker/1:824:5462 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc051000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:825:5464 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:825 state:D stack:0 pid:5464 tgid:5464 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:855e6c00
r4:855e6c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e6c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb61b000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8560bf8c r4:8560bc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8560bf8c r4:84fab700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e6c00 r8:84fab72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab700 r8:80287e08 r7:eba7de60 r6:84fab880 r5:855e6c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba81fb0 to 0xeba81ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f80cc0
INFO: task kworker/1:825:5464 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc496000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:826:5467 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:826 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba85d84 r8:00000002 r7:60000113 r6:eba85d8c r5:855e2400
r4:855e2400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e2400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d140
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb643000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561438c r4:85614000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561438c r4:84fab780
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e2400 r8:84fab7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab780
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab780 r8:80287e08 r7:eba81e60 r6:84fab800 r5:855e2400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba85fb0 to 0xeba85ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d200
INFO: task kworker/1:826:5467 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc496000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:827:5469 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:827 state:D stack:0 pid:5469 tgid:5469 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba89d84 r8:00000002 r7:60000013 r6:eba89d8c r5:855e8000
r4:855e8000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e8000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d4c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb723000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85614b8c r4:85614800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85614b8c r4:84fab900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e8000 r8:84fab92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fab900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fab900 r8:80287e08 r7:eba85e60 r6:84fab980 r5:855e8000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba89fb0 to 0xeba89ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d100
INFO: task kworker/1:827:5469 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc496000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:828:5471 blocked for more than 476 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:828 state:D stack:0 pid:5471 tgid:5471 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:855e8c00
r4:855e8c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e8c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb707000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561478c r4:85614400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561478c r4:84faba00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e8c00 r8:84faba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84faba00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84faba00 r8:80287e08 r7:eba89e60 r6:84fabb80 r5:855e8c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba8dfb0 to 0xeba8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d440
INFO: task kworker/1:828:5471 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cc887000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:829:5472 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:829 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba95d84 r8:00000002 r7:60000013 r6:eba95d8c r5:855e9800
r4:855e9800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855e9800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d6c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb73d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85614f8c r4:85614c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85614f8c r4:84faba80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855e9800 r8:84fabaac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84faba80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84faba80 r8:80287e08 r7:eba89e60 r6:84fabc80 r5:855e9800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba95fb0 to 0xeba95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d5c0
INFO: task kworker/1:829:5472 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ccb42000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:830:5475 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:830 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:855ea400
r4:855ea400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855ea400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d800
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb759000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561538c r4:85615000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561538c r4:84fabc00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855ea400 r8:84fabc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fabc00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fabc00 r8:80287e08 r7:eba95e60 r6:84fabd00 r5:855ea400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba91fb0 to 0xeba91ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d680
INFO: task kworker/1:830:5475 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cceab000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:831:5477 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:831 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:855eb000
r4:855eb000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855eb000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3d9c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7a3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561578c r4:85615400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561578c r4:84fabb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855eb000 r8:84fabb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fabb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fabb00 r8:80287e08 r7:eba91e60 r6:84fabe80 r5:855eb000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba9dfb0 to 0xeba9dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d740
INFO: task kworker/1:831:5477 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cceab000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:340:5478 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:340 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000113 r6:ebaa5d8c r5:8558b000
r4:8558b000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558b000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476040
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8558b000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb949000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85644b8c r4:85644800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85644b8c r4:85384580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558b000 r8:853845ac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85384580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85384580 r8:80287e08 r7:eba61e60 r6:85384600 r5:8558b000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa5fb0 to 0xebaa5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85370940
INFO: task kworker/0:340:5478 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cd326000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:832:5480 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:832 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaadd84 r8:00000002 r7:60000013 r6:ebaadd8c r5:8558c800
r4:8558c800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558c800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3db40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8558c800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb7b5000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85615b8c r4:85615800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85615b8c r4:84fabd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558c800 r8:84fabdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fabd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fabd80 r8:80287e08 r7:eba9de60 r6:85384500 r5:8558c800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaadfb0 to 0xebaadff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3d980
INFO: task kworker/1:832:5480 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cd413000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:833:5482 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:833 state:D stack:0 pid:5482 tgid:5482 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebab5d84 r8:00000002 r7:60000013 r6:ebab5d8c r5:8558d400
r4:8558d400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558d400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3dbc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8558d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb933000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85615f8c r4:85615c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85615f8c r4:84fabe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558d400 r8:84fabe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fabe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fabe00 r8:80287e08 r7:ebaade60 r6:85384680 r5:8558d400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebab5fb0 to 0xebab5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3db00
INFO: task kworker/1:833:5482 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cd413000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:834:5483 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:834 state:D stack:0 pid:5483 tgid:5483 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:8558bc00
r4:8558bc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558bc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f3de40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8558bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb959000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561638c r4:85616000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561638c r4:84fabf80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558bc00 r8:84fabfac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fabf80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fabf80 r8:80287e08 r7:ebab5e60 r6:85384700 r5:8558bc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebab9fb0 to 0xebab9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3dcc0
INFO: task kworker/1:834:5483 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cd9b1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:835:5487 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:835 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaa1d84 r8:00000002 r7:60000013 r6:ebaa1d8c r5:8558e000
r4:8558e000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558e000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85370940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8558e000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb965000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561678c r4:85616400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561678c r4:8546f000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558e000 r8:8546f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f000 r8:80287e08 r7:ebab9e60 r6:85384780 r5:8558e000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaa1fb0 to 0xebaa1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84f3de00
INFO: task kworker/1:835:5487 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cd9b1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:341:5488 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:341 state:D stack:0 pid:5488 tgid:5488 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:8558ec00
r4:8558ec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558ec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:8558ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb997000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85644f8c r4:85644c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85644f8c r4:85384900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558ec00 r8:8538492c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85384900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85384900 r8:80287e08 r7:eba61e60 r6:85384800 r5:8558ec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebabdfb0 to 0xebabdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85476140
INFO: task kworker/0:341:5488 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cdcc9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:836:5489 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:836 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebac1d84 r8:00000002 r7:60000113 r6:ebac1d8c r5:8558a400
r4:8558a400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:8558a400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:8558a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebac9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85616b8c r4:85616800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85616b8c r4:8546f080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:8558a400 r8:8546f0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f080 r8:80287e08 r7:ebaa1e60 r6:85384880 r5:8558a400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebac1fb0 to 0xebac1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853700c0
INFO: task kworker/1:836:5489 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cdcc9000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:343:5495 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:343 state:D stack:0 pid:5495 tgid:5495 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:85589800
r4:85589800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85589800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:85589800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb9d3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8564578c r4:85645400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:8564578c r4:85384a80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85589800 r8:85384aac r7:82804d40 r6:dddced80 r5:dddceda0
r4:85384a80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85384a80 r8:80287e08 r7:ebab1e60 r6:85384b00 r5:85589800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebac5fb0 to 0xebac5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:85476540
INFO: task kworker/0:343:5495 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ce415000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:837:5497 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:837 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:84e24800
r4:84e24800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e24800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba99e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84e24800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebad3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85616f8c r4:85616c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85616f8c r4:8546f200
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e24800 r8:8546f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f200
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f200 r8:80287e08 r7:ebac1e60 r6:85384b80 r5:84e24800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xeba99fb0 to 0xeba99ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4080
INFO: task kworker/1:837:5497 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ce415000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/0:344:5498 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:344 state:D stack:0 pid:5498 tgid:5498 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:84e25400
r4:84e25400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84e25400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85601500
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84e25400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb7f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85645b8c r4:85645800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85645b8c r4:85384c00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84e25400 r8:85384c2c r7:82804d40 r6:dddced80 r5:dddceda0
r4:85384c00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:85384c00 r8:80287e08 r7:ebab1e60 r6:85384c80 r5:84e25400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebad9fb0 to 0xebad9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854766c0
INFO: task kworker/0:344:5498 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ce4f1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:838:5500 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:838 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebae5d84 r8:00000002 r7:60000113 r6:ebae5d8c r5:84d60c00
r4:84d60c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d60c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4340
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d60c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebadd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561738c r4:85617000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561738c r4:8546f280
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d60c00 r8:8546f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f280
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f280 r8:80287e08 r7:eba99e60 r6:85384d00 r5:84d60c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae5fb0 to 0xebae5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f41c0
INFO: task kworker/1:838:5500 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ce4f1000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:839:5502 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:839 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:84d62400
r4:84d62400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d62400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f43c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d62400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebaf3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561778c r4:85617400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561778c r4:8546f300
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d62400 r8:8546f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f300
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f300 r8:80287e08 r7:ebae5e60 r6:85384d80 r5:84d62400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebaf1fb0 to 0xebaf1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4280
INFO: task kworker/1:839:5502 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: ce8ee000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:840:5504 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:840 state:D stack:0 pid:5504 tgid:5504 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:84d61800
r4:84d61800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d61800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4700
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d61800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb0f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85617f8c r4:85617c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85617f8c r4:8546f380
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d61800 r8:8546f3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f380
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f380 r8:80287e08 r7:ebaf1e60 r6:85384e00 r5:84d61800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb05fb0 to 0xebb05ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4400
INFO: task kworker/1:840:5504 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cf133000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:841:5506 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:841 state:D stack:0 pid:5506 tgid:5506 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb0dd84 r8:00000002 r7:60000113 r6:ebb0dd8c r5:84d63c00
r4:84d63c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d63c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4580
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d63c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebaf9000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85617b8c r4:85617800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85617b8c r4:8546f180
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d63c00 r8:8546f1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f180
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f180 r8:80287e08 r7:ebb05e60 r6:85384e80 r5:84d63c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb0dfb0 to 0xebb0dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4400
INFO: task kworker/1:841:5506 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cf133000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:842:5508 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:842 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb1dd84 r8:00000002 r7:60000113 r6:ebb1dd8c r5:84d60000
r4:84d60000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d60000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d60000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb15000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561c38c r4:8561c000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561c38c r4:8546f400
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d60000 r8:8546f42c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f400
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f400 r8:80287e08 r7:ebb05e60 r6:85384f00 r5:84d60000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb1dfb0 to 0xebb1dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f44c0
INFO: task kworker/1:842:5508 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cf4f5000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:843:5510 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:843 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:84d64800
r4:84d64800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d64800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85476d00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d64800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb65000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561db8c r4:8561d800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561db8c r4:8546f500
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d64800 r8:8546f52c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f500
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f500 r8:80287e08 r7:ebb1de60 r6:85384f80 r5:84d64800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb35fb0 to 0xebb35ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4840
INFO: task kworker/1:843:5510 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:844:5512 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:844 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:84d66000
r4:84d66000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d66000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d66000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb27000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561c78c r4:8561c400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561c78c r4:8546f480
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d66000 r8:8546f4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f480
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f480 r8:80287e08 r7:ebb35e60 r6:85600000 r5:84d66000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb39fb0 to 0xebb39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4840
INFO: task kworker/1:844:5512 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:845:5513 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:845 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb41d84 r8:00000002 r7:60000013 r6:ebb41d8c r5:84d65400
r4:84d65400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d65400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4840
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d65400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb2d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561cb8c r4:8561c800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561cb8c r4:8546f580
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d65400 r8:8546f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f580
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f580 r8:80287e08 r7:ebb35e60 r6:85600080 r5:84d65400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb41fb0 to 0xebb41ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4980
INFO: task kworker/1:845:5513 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:846:5515 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:846 state:D stack:0 pid:5515 tgid:5515 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:85680000
r4:85680000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85680000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85680000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb47000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561cf8c r4:8561cc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561cf8c r4:8546f680
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85680000 r8:8546f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f680
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f680 r8:80287e08 r7:ebb35e60 r6:85600100 r5:85680000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb51fb0 to 0xebb51ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4ac0
INFO: task kworker/1:846:5515 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:847:5517 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:847 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:855ebc00
r4:855ebc00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855ebc00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4d40
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb4d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561d38c r4:8561d000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561d38c r4:8546f700
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855ebc00 r8:8546f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f700
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f700 r8:80287e08 r7:ebb35e60 r6:8546f780 r5:855ebc00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebacdfb0 to 0xebacdff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4b40
INFO: task kworker/1:847:5517 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: cfeba000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:848:5520 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:848 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:855ed400
r4:855ed400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855ed400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb5f000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561d78c r4:8561d400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561d78c r4:8546f100
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855ed400 r8:8546f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f100
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f100 r8:80287e08 r7:ebb35e60 r6:8546f800 r5:855ed400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb5dfb0 to 0xebb5dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:854769c0
INFO: task kworker/1:848:5520 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0623000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:849:5523 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:849 state:D stack:0 pid:5523 tgid:5523 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebae1d84 r8:00000002 r7:60000013 r6:ebae1d8c r5:855eec00
r4:855eec00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855eec00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb73000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561df8c r4:8561dc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561df8c r4:8546f880
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855eec00 r8:8546f8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f880
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f880 r8:80287e08 r7:ebb35e60 r6:8546f980 r5:855eec00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebae1fb0 to 0xebae1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:853f4f40
INFO: task kworker/1:849:5523 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:850:5525 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:850 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb69d84 r8:00000002 r7:60000013 r6:ebb69d8c r5:855f0000
r4:855f0000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855f0000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855f0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb79000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561e38c r4:8561e000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561e38c r4:8546f600
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855f0000 r8:8546f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f600
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f600 r8:80287e08 r7:ebae1e60 r6:8546fa80 r5:855f0000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb69fb0 to 0xebb69ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9080
INFO: task kworker/1:850:5525 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:851:5526 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:851 state:D stack:0 pid:5526 tgid:5526 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb8dd84 r8:00000002 r7:60000013 r6:ebb8dd8c r5:855f1800
r4:855f1800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855f1800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9440
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb85000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561e78c r4:8561e400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561e78c r4:8546f900
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855f1800 r8:8546f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546f900
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546f900 r8:80287e08 r7:ebb69e60 r6:8546fa00 r5:855f1800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb8dfb0 to 0xebb8dff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9280
INFO: task kworker/1:851:5526 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d0dfc000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:852:5529 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:852 state:D stack:0 pid:5529 tgid:5529 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:855f0c00
r4:855f0c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:855f0c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9740
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:855f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb9d000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561ef8c r4:8561ec00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561ef8c r4:8546fb00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:855f0c00 r8:8546fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546fb00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546fb00 r8:80287e08 r7:ebb8de60 r6:8546fc80 r5:855f0c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb95fb0 to 0xebb95ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9200
INFO: task kworker/1:852:5529 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:853:5530 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:853 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebb71d84 r8:00000002 r7:60000013 r6:ebb71d8c r5:85682400
r4:85682400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85682400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9600
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85682400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebb97000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561eb8c r4:8561e800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561eb8c r4:8546fb80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85682400 r8:8546fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546fb80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546fb80 r8:80287e08 r7:ebb95e60 r6:85600180 r5:85682400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebb71fb0 to 0xebb71ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9200
INFO: task kworker/1:853:5530 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:854:5533 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:854 state:D stack:0 pid:5533 tgid:5533 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000113 r6:ebba9d8c r5:85680c00
r4:85680c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85680c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9880
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85680c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbab000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561f38c r4:8561f000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561f38c r4:8546fd80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85680c00 r8:8546fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546fd80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546fd80 r8:80287e08 r7:ebb95e60 r6:85600280 r5:85680c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebba9fb0 to 0xebba9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9240
INFO: task kworker/1:854:5533 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:855:5536 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:855 state:D stack:0 pid:5536 tgid:5536 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:85684800
r4:85684800
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85684800 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9940
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85684800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbb1000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561f78c r4:8561f400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561f78c r4:8546fe00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85684800 r8:8546fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546fe00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546fe00 r8:80287e08 r7:ebba9e60 r6:85600380 r5:85684800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbb9fb0 to 0xebbb9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b97c0
INFO: task kworker/1:855:5536 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d1819000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:856:5538 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:856 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbc5d84 r8:00000002 r7:60000113 r6:ebbc5d8c r5:85683c00
r4:85683c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85683c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9a80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85683c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbc7000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561fb8c r4:8561f800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561fb8c r4:8546fe80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85683c00 r8:8546feac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546fe80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546fe80 r8:80287e08 r7:ebbb9e60 r6:85600400 r5:85683c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbc5fb0 to 0xebbc5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9980
INFO: task kworker/1:856:5538 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d21ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:857:5540 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:857 state:D stack:0 pid:5540 tgid:5540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbd9d84 r8:00000002 r7:60000013 r6:ebbd9d8c r5:85685400
r4:85685400
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85685400 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbd9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9bc0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85685400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:ebbcd000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8561ff8c r4:8561fc00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8561ff8c r4:8546ff00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85685400 r8:8546ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546ff00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546ff00 r8:80287e08 r7:ebbc5e60 r6:85600480 r5:85685400
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbd9fb0 to 0xebbd9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b99c0
INFO: task kworker/1:857:5540 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d21ad000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:858:5542 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:858 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbddd84 r8:00000002 r7:60000113 r6:ebbddd8c r5:85686c00
r4:85686c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85686c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbdde08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9d80
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85686c00 r7:00000000 r6:83018200 r5:00001000 r4:7f011000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa77000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8562438c r4:85624000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8562438c r4:8546fd00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85686c00 r8:8546fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:8546fd00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8546fd00 r8:80287e08 r7:ebbd9e60 r6:85600500 r5:85686c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbddfb0 to 0xebbddff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9b00
INFO: task kworker/1:858:5542 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d24f3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:859:5544 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:859 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbe1d84 r8:00000002 r7:60000113 r6:ebbe1d8c r5:85686000
r4:85686000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85686000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9200
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85686000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eacef000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85624b8c r4:85624800
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85624b8c r4:855b1a00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85686000 r8:855b1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:855b1a00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:855b1a00 r8:80287e08 r7:ebbdde60 r6:85600580 r5:85686000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe1fb0 to 0xebbe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9d40
INFO: task kworker/1:859:5544 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d24f3000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:860:5546 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:860 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbe5d84 r8:00000002 r7:60000013 r6:ebbe5d8c r5:85683000
r4:85683000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:85683000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856b9ec0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:85683000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:e0533000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8562478c r4:85624400
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8562478c r4:84fabf00
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:85683000 r8:84fabf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:84fabf00
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84fabf00 r8:80287e08 r7:ebbe1e60 r6:85600600 r5:85683000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe5fb0 to 0xebbe5ff8)
5fa0: 00000000 00000000 00000000 00000000
5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
5fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9c40
INFO: task kworker/1:860:5546 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:861:5548 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:861 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbe9d84 r8:00000002 r7:60000013 r6:ebbe9d8c r5:84d66c00
r4:84d66c00
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d66c00 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc000
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eaec3000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85624f8c r4:85624c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:85624f8c r4:856bd000
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d66c00 r8:856bd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:856bd000
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:856bd000 r8:80287e08 r7:ebbe1e60 r6:85600680 r5:84d66c00
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbe9fb0 to 0xebbe9ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856b9f40
INFO: task kworker/1:861:5548 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
INFO: task kworker/1:862:5551 blocked for more than 477 seconds.
Not tainted 6.15.0-rc6-syzkaller #0
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:862 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a53ea8>] (__schedule_loop kernel/sched/core.c:6845 [inline])
[<81a52f24>] (__schedule) from [<81a53ea8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860)
r10:8291a684 r9:ebbedd84 r8:00000002 r7:60000113 r6:ebbedd8c r5:84d63000
r4:84d63000
[<81a53e7c>] (schedule) from [<81a54290>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917)
r5:84d63000 r4:8291a680
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline])
[<81a54278>] (schedule_preempt_disabled) from [<81a56974>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746)
[<81a56674>] (__mutex_lock.constprop.0) from [<81a56e40>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033)
r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbede08
r4:00000000
[<81a56e2c>] (__mutex_lock_slowpath) from [<81a56e80>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277)
[<81a56e44>] (mutex_lock) from [<804e77f0>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860)
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bc1c0
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018205 r8:84d63000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:eb025000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:8562538c r4:85625000
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:ddde2d80 r6:83018200 r5:8562538c r4:856bd080
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d63000 r8:856bd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0
r4:856bd080
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:856bd080 r8:80287e08 r7:ebbe9e60 r6:85600700 r5:84d63000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebbedfb0 to 0xebbedff8)
dfa0: 00000000 00000000 00000000 00000000
dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
dfe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:856bc0c0
INFO: task kworker/1:862:5551 is blocked on a mutex likely owned by task kworker/0:123:3540.
task:kworker/0:123 state:R running task stack:0 pid:3540 tgid:3540 ppid:2 task_flags:0x4208060 flags:0x00000000
Workqueue: events bpf_prog_free_deferred
Call trace:
[<81a52f24>] (__schedule) from [<81a542dc>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090)
r10:82ac21c4 r9:84d91800 r8:80200be4 r7:dffe1d5c r6:ffffffff r5:84d91800
r4:00000000
[<81a5429c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18)
Exception stack(0xdffe1d28 to 0xdffe1d70)
1d20: d2c5c000 dfeb5000 00000001 80239b98 7f081000 00000001
1d40: 82ac15a0 7f081000 dfeb5000 8280c928 82ac21c4 dffe1da4 dffe1da8 dffe1d78
1d60: 80230ad0 80239bb0 80070013 ffffffff
r5:80070013 r4:80239bb0
[<80230a6c>] (flush_tlb_kernel_range) from [<804e75c4>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284)
r4:82ac21e4
[<804e73b4>] (__purge_vmap_area_lazy) from [<804e796c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899)
r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dffe1dc0 r5:dffe1e08
r4:dffe1dc0
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vm_reset_perms mm/vmalloc.c:3294 [inline])
[<804e7788>] (_vm_unmap_aliases) from [<804eb6d0>] (vfree+0x168/0x204 mm/vmalloc.c:3373)
r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8555cc00
r4:00000000
[<804eb568>] (vfree) from [<8054b144>] (execmem_free+0x30/0x50 mm/execmem.c:431)
r9:83018005 r8:84d91800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000
[<8054b114>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077)
r5:00001000 r4:dfa13000
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline])
[<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246)
[<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886)
r5:85ef9f8c r4:85ef9c00
[<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238)
r7:dddced80 r6:83018000 r5:85ef9f8c r4:84e0be80
[<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline])
[<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400)
r10:61c88647 r9:84d91800 r8:84e0beac r7:82804d40 r6:dddced80 r5:dddceda0
r4:84e0be80
[<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:84e0be80 r8:80287e08 r7:dfec1e60 r6:84e0bf80 r5:84d91800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdffe1fb0 to 0xdffe1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:84d87ac0
Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT
Hardware name: ARM-Versatile Express
Call trace:
[<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c arch/arm/kernel/traps.c:257)
r7:00000000 r6:00070013 r5:60070093 r4:82257e00
[<80201ac8>] (show_stack) from [<8022003c>] (__dump_stack lib/dump_stack.c:94 [inline])
[<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c lib/dump_stack.c:120)
[<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c lib/dump_stack.c:129)
r5:00000000 r4:00000001
[<80220048>] (dump_stack) from [<81a3d08c>] (nmi_cpu_backtrace+0x160/0x17c lib/nmi_backtrace.c:113)
[<81a3cf2c>] (nmi_cpu_backtrace) from [<81a3d1d8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8 lib/nmi_backtrace.c:62)
r7:00000000 r6:8280c610 r5:8281af00 r4:ffffffff
[<81a3d0a8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c arch/arm/kernel/smp.c:852)
r9:0000ea92 r8:82ab6564 r7:8280c788 r6:00007766 r5:8281b4c8 r4:85d86f0c
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (trigger_all_cpu_backtrace include/linux/nmi.h:158 [inline])
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (check_hung_uninterruptible_tasks kernel/hung_task.c:274 [inline])
[<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386da8>] (watchdog+0x4a8/0x69c kernel/hung_task.c:437)
[<80386900>] (watchdog) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:00000000 r8:80386900 r7:83348780 r6:83348780 r5:83251800
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xdf8e1fb0 to 0xdf8e1ff8)
1fa0: 00000000 00000000 00000000 00000000
1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
1fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:8334b500
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 2820 Comm: pr/ttyAMA0 Not tainted 6.15.0-rc6-syzkaller #0 PREEMPT
Hardware name: ARM-Versatile Express
PC is at __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
PC is at _raw_spin_unlock_irqrestore+0x28/0x54 kernel/locking/spinlock.c:194
LR is at spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
LR is at __uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline]
LR is at pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603
pc : [<81a5c2ac>] lr : [<80a629ec>] psr: 60070013
sp : ebe39eb0 ip : ebe39ec0 fp : ebe39ebc
r10: 8295b3bc r9 : 00000001 r8 : 00000000
r7 : 00000117 r6 : 8295b320 r5 : 00000000 r4 : 00000001
r3 : 0000e1f8 r2 : 00000000 r1 : 60070013 r0 : 842e5440
Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none
Control: 30c5387d Table: 847b3d40 DAC: 00000000
Call trace:
[<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (spin_unlock_irqrestore include/linux/spinlock.h:406 [inline])
[<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (__uart_port_unlock_irqrestore include/linux/serial_core.h:614 [inline])
[<81a5c284>] (_raw_spin_unlock_irqrestore) from [<80a629ec>] (pl011_console_device_unlock+0x20/0x24 drivers/tty/serial/amba-pl011.c:2603)
[<80a629cc>] (pl011_console_device_unlock) from [<802efd14>] (nbcon_emit_one+0x80/0xf8 kernel/printk/nbcon.c:1123)
[<802efc94>] (nbcon_emit_one) from [<802eff34>] (nbcon_kthread_func+0x1a8/0x2a4 kernel/printk/nbcon.c:1210)
r6:8280c610 r5:84696000 r4:8295b320
[<802efd8c>] (nbcon_kthread_func) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464)
r10:00000000 r9:8295b320 r8:802efd8c r7:843eb400 r6:843eb400 r5:84696000
r4:00000001
[<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)
Exception stack(0xebe39fb0 to 0xebe39ff8)
9fa0: 00000000 00000000 00000000 00000000
9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
9fe0: 00000000 00000000 00000000 00000000 00000013 00000000
r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50
r4:83944240